<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[Security for the Rest of Us]]></title><description><![CDATA[Hi there 👋 My name is Nathan. I’m an infosec pro who writes about tech, security things, and career learnings.]]></description><link>https://heroicpanda.com</link><image><url>https://substackcdn.com/image/fetch/$s_!_Qoh!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F16696cf0-3ce1-4e79-983e-00f3154de4f4_500x500.png</url><title>Security for the Rest of Us</title><link>https://heroicpanda.com</link></image><generator>Substack</generator><lastBuildDate>Sat, 16 May 2026 00:29:21 GMT</lastBuildDate><atom:link href="https://heroicpanda.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Nathan Walker]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[heroicpandasec@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[heroicpandasec@substack.com]]></itunes:email><itunes:name><![CDATA[Nathan Walker]]></itunes:name></itunes:owner><itunes:author><![CDATA[Nathan Walker]]></itunes:author><googleplay:owner><![CDATA[heroicpandasec@substack.com]]></googleplay:owner><googleplay:email><![CDATA[heroicpandasec@substack.com]]></googleplay:email><googleplay:author><![CDATA[Nathan Walker]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[My GCIH Experience]]></title><description><![CDATA[An overview of my SANS learning journey, GCIH certification prep, and exam experience]]></description><link>https://heroicpanda.com/p/my-gcih-experience</link><guid isPermaLink="false">https://heroicpanda.com/p/my-gcih-experience</guid><dc:creator><![CDATA[Nathan Walker]]></dc:creator><pubDate>Sun, 28 Dec 2025 02:27:07 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!y0Eb!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F640430c5-ca13-40c1-8eb4-758ce23021fd_4000x2240.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!y0Eb!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F640430c5-ca13-40c1-8eb4-758ce23021fd_4000x2240.png" data-component-name="Image2ToDOM"><div class="image2-inset image2-full-screen"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!y0Eb!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F640430c5-ca13-40c1-8eb4-758ce23021fd_4000x2240.png 424w, https://substackcdn.com/image/fetch/$s_!y0Eb!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F640430c5-ca13-40c1-8eb4-758ce23021fd_4000x2240.png 848w, https://substackcdn.com/image/fetch/$s_!y0Eb!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F640430c5-ca13-40c1-8eb4-758ce23021fd_4000x2240.png 1272w, https://substackcdn.com/image/fetch/$s_!y0Eb!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F640430c5-ca13-40c1-8eb4-758ce23021fd_4000x2240.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!y0Eb!,w_5760,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F640430c5-ca13-40c1-8eb4-758ce23021fd_4000x2240.png" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/640430c5-ca13-40c1-8eb4-758ce23021fd_4000x2240.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:false,&quot;imageSize&quot;:&quot;full&quot;,&quot;height&quot;:815,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:4443104,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://heroicpandasec.substack.com/i/182083831?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F640430c5-ca13-40c1-8eb4-758ce23021fd_4000x2240.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:&quot;center&quot;,&quot;offset&quot;:false}" class="sizing-fullscreen" alt="" srcset="https://substackcdn.com/image/fetch/$s_!y0Eb!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F640430c5-ca13-40c1-8eb4-758ce23021fd_4000x2240.png 424w, https://substackcdn.com/image/fetch/$s_!y0Eb!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F640430c5-ca13-40c1-8eb4-758ce23021fd_4000x2240.png 848w, https://substackcdn.com/image/fetch/$s_!y0Eb!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F640430c5-ca13-40c1-8eb4-758ce23021fd_4000x2240.png 1272w, https://substackcdn.com/image/fetch/$s_!y0Eb!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F640430c5-ca13-40c1-8eb4-758ce23021fd_4000x2240.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">SANS &amp; GCIH logos are property of The Escal Institute of Advanced Technologies, Inc. d/b/a SANS Institute and GIAC, LLC, respectively</figcaption></figure></div><p>Years ago, I was hired into the IT Leadership Development Program for a multinational manufacturing corporation. These kinds of programs are not uncommon for larger organizations, serving as a means to bring in fresh talent and expose them to different functional areas over time, all while fostering the growth of skills and business acumen. My program, just like others that exist in corporate America, was a 2-year commitment where you, as the enterprising college graduate, rotate across four functions within an IT department. The aim of such programs is that new hires gain experience across technical areas that would&#8217;ve have encountered otherwise, eventually settling into a role that fits their skillset and meets a business need. Specifically for the one I went through, a parallel focus was placed on mentorship, where a senior people leader in IT would help shepherd you through your first couple of years.</p><p>I underwent four rotations during my time in that development program: (1) networking, which was what I enjoyed most, (2) SAP development, (3) security, and (4) business intelligence/analytics. Networking was something I had studied and practiced in my college classes but I had never been involved in much security work or business analytics in my internship, let alone ever seeing something as monstrous as a global SAP deployment. The networking toil of troubleshooting, hands-on pulling of cable and racking-and-stacking equipment was something I enjoyed. I had some fantastic mentors on that networking team who were also incredibly generous with their time and, fortunately for me, very understanding when it came to working with rookie network admins like myself. But, that six-month rotation onto the Security Team was when I caught the security bug and started looking into security-related trainings.</p><p>The security world boasts a cornucopia of certifications on top of a seemingly endless amount of trainings, ranging from free or low-cost to full undergraduate degrees. Among that sea of available training courses, the SANS Institute stands out. I&#8217;ve been eyeing an opportunity to jump into a SANS course ever since.</p><p>So, when I had the chance to sign up for one, you can bet I jumped right to the front of the line! </p><p>Here, I&#8217;ll share insight of my SANS training, my study efforts, and my experience with taking the GCIH exam.</p><div><hr></div><h1>Important: What this post is *not*<em> </em>about</h1><p>Anyone and everyone aiming to earn a certification of any kind hops into Google and types the phrase, &#8220;<em>how to pass gcih exam</em>&#8221; (lowercase and everything, amirite?). I know I&#8217;ve done this for every certification I&#8217;ve earned, plus the ones I&#8217;ve never even attempted. For me, I&#8217;m either looking to tips &#8216;n tricks or simply doing some research into what the materials and exam entail.</p><p>But, there are some people out there who are looking for the easy way out. </p><p>This blog post, my friends, is <em>not</em> an easy way out. Nothing in this article you&#8217;re about to read will disclose anything that I&#8217;m not authorized to share. </p><blockquote><p><strong>The SANS Institute, just like any other legitimate certification body, has a strict zero-tolerance policy for the sharing of course materials or questions/answers from exams.</strong> </p></blockquote><p>Any information I share about SANS training or the GCIH exam will all tie back to publicly available information, albeit dappled with insights formed through my own experience. Hopefully you&#8217;re not reading this looking for an easy way out, but, just in case it needs to be said, you <em>won&#8217;t</em> find anything like that here. This SANS course was wonderful and I only wish to help future students learn from my experiences.</p><p>Now, on to the fun stuff, I say! Huzzah!</p><h1>Why I pursued the GCIH</h1><h3>Selecting the right SANS course for me</h3><p>In my current work as a security engineer, I find myself bouncing constantly from one thing to another, just like most other security professionals I know. Most of my day-to-day fun involves running security operations, so you never know what you&#8217;re going to run into (which is both really cool and really terrifying at the same time). I&#8217;ve come to realize that the typical work tasks are the easy part, but, for security pros, incidents demand that you&#8217;re ready to execute at your highest level of excellence.</p><p>I&#8217;ve long been fascinated by incident response, asking myself such questions as:</p><ul><li><p>What is incident response best practice? Or, is there more than one way to handle an incident in the best way?</p></li><li><p>How do high-functioning teams tackle incident response efforts?</p></li><li><p>Why is incident response something that most organizations struggle with?</p></li><li><p>What skills are required to be a top-notch incident response professional?</p></li></ul><p>When I got the chance to take my first SANS training, the SEC504 course, <a href="https://www.sans.org/cyber-security-courses/hacker-techniques-incident-handling">Hacker Tools, Techniques, and Incident Handling</a>, I was drawn to it right way. The syllabus, detailed <a href="https://www.sans.org/cyber-security-courses/hacker-techniques-incident-handling#:~:text=about%20Joshua%20Wright-,Course%20Syllabus,-Explore%20the%20course">here</a> on the same page, outlines a strong mix of the theoretical and the practical.</p><p>Even before signing up for anything or putting money down, you can see <em>exactly</em> what you will be learning when you take the SEC504 course. Under the &#8220;Course Syllabus&#8221;, each &#8220;section&#8221; shows you a full day&#8217;s instruction or focus, including whether or not there are hands-on labs involved.</p><p>I love and appreciate this level of transparency. When you are requesting that your employer pay for your training, you need to bring receipts (literally). Anyone who has requested training from an employer knows that the more information you have, the better. SANS does a fabulous job of arming you with well-articulated reasonings to help you justify <em>why</em> your employer should invest in you by purchasing this course.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-1" href="#footnote-1" target="_self">1</a></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Qz56!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7f6e6787-75e1-4681-87be-ab2c0746cedf_3526x2192.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Qz56!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7f6e6787-75e1-4681-87be-ab2c0746cedf_3526x2192.png 424w, https://substackcdn.com/image/fetch/$s_!Qz56!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7f6e6787-75e1-4681-87be-ab2c0746cedf_3526x2192.png 848w, https://substackcdn.com/image/fetch/$s_!Qz56!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7f6e6787-75e1-4681-87be-ab2c0746cedf_3526x2192.png 1272w, https://substackcdn.com/image/fetch/$s_!Qz56!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7f6e6787-75e1-4681-87be-ab2c0746cedf_3526x2192.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Qz56!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7f6e6787-75e1-4681-87be-ab2c0746cedf_3526x2192.png" width="1456" height="905" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/7f6e6787-75e1-4681-87be-ab2c0746cedf_3526x2192.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:905,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2411676,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://heroicpandasec.substack.com/i/182083831?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7f6e6787-75e1-4681-87be-ab2c0746cedf_3526x2192.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Qz56!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7f6e6787-75e1-4681-87be-ab2c0746cedf_3526x2192.png 424w, https://substackcdn.com/image/fetch/$s_!Qz56!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7f6e6787-75e1-4681-87be-ab2c0746cedf_3526x2192.png 848w, https://substackcdn.com/image/fetch/$s_!Qz56!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7f6e6787-75e1-4681-87be-ab2c0746cedf_3526x2192.png 1272w, https://substackcdn.com/image/fetch/$s_!Qz56!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7f6e6787-75e1-4681-87be-ab2c0746cedf_3526x2192.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>For me, as someone with some security and IT experience with an interest in incident response preparedness, this seemed like a great way for me to jump into something I&#8217;m interested in while exploring things I wasn&#8217;t too proficient at, like attack techniques.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-2" href="#footnote-2" target="_self">2</a> </p><h3>The GCIH certification</h3><p>Most SANS courses have a certification based directly on that course&#8217;s material. Whenever this is the case, SANS tells you so at the top of the main information page, like here for <a href="https://www.sans.org/cyber-security-courses/hacker-techniques-incident-handling#:~:text=GIAC%20Certified%20Incident%20Handler%20Certification%20(GCIH)">SEC504</a>:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!BkiB!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1d1dd507-3547-4566-a364-e2062264104b_2334x1748.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!BkiB!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1d1dd507-3547-4566-a364-e2062264104b_2334x1748.png 424w, https://substackcdn.com/image/fetch/$s_!BkiB!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1d1dd507-3547-4566-a364-e2062264104b_2334x1748.png 848w, https://substackcdn.com/image/fetch/$s_!BkiB!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1d1dd507-3547-4566-a364-e2062264104b_2334x1748.png 1272w, https://substackcdn.com/image/fetch/$s_!BkiB!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1d1dd507-3547-4566-a364-e2062264104b_2334x1748.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!BkiB!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1d1dd507-3547-4566-a364-e2062264104b_2334x1748.png" width="1456" height="1090" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/1d1dd507-3547-4566-a364-e2062264104b_2334x1748.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1090,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1702669,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://heroicpandasec.substack.com/i/182083831?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1d1dd507-3547-4566-a364-e2062264104b_2334x1748.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!BkiB!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1d1dd507-3547-4566-a364-e2062264104b_2334x1748.png 424w, https://substackcdn.com/image/fetch/$s_!BkiB!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1d1dd507-3547-4566-a364-e2062264104b_2334x1748.png 848w, https://substackcdn.com/image/fetch/$s_!BkiB!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1d1dd507-3547-4566-a364-e2062264104b_2334x1748.png 1272w, https://substackcdn.com/image/fetch/$s_!BkiB!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1d1dd507-3547-4566-a364-e2062264104b_2334x1748.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>&#8220;Why isn&#8217;t it called the, &#8216;GIAC Certified Incident Handler Certification (GCIH)&#8217; course instead?&#8221; I thought the same thing! I mean, does the class itself boost your resume, or the certification? The certification. I remember wondering why the class doesn&#8217;t focus on the certification, like most of the security training world does for things like Security+, CISSP, etc.</p><p>However, I came to realize that the separation between course and the associated certification is much, much better. When you take a SANS course, the entirety of that course is focused on the <em>material</em>. </p><blockquote><p><strong>The material of any given training should focus primarily on theory, concepts, context, and giving you hands-on practice, not on just passing the exam.</strong><a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-3" href="#footnote-3" target="_self">3</a></p></blockquote><p>And SANS did a great job of that based on my SEC504 experience.</p><p><a href="https://www.willhackforsushi.com/?page_id=87">Joshua Wright</a>, course author of SEC504 and the instructor who taught my class at SANS Boston, rarely mentioned the exam and I loved this. I&#8217;ve taken other week-long trainings before that were geared more towards something like, &#8220;Alright, so here&#8217;s how you&#8217;ll pass the exam&#8230; Remember these tips &#8216;n tricks for the exam,&#8221; while my SEC504 experience was more akin to, &#8220;We&#8217;re more concerned with helping you <em>learn</em> these concepts and making sure you understand how to apply them.&#8221;</p><p>The result? I was a more confident student because I felt like I was gaining knowledge and skills, not just a paltry toolbox for passing a test.</p><p>By separating out the course from the associated credential, every SANS student, whether they are pursuing a certification or not, stands to gain equally from the material presented.</p><h4>To be in-person or not to be in-person&#8230; that is the question</h4><p>Should &#8220;in-person&#8221; be hyphenated? I have no clue. Hyphenate the planet!<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-4" href="#footnote-4" target="_self">4</a></p><p>There are both in-person and virtual (&#8220;OnDemand&#8221; as listed by SANS&#8212;they don&#8217;t include a space, so don&#8217;t judge me) options when selecting a course. I selected to learn in a physical classroom with the instructor and other learners</p><p>I chose in-person because:</p><ul><li><p>I wanted to minimize distractions</p></li><li><p>Traveling to new places, even if you&#8217;re spending 99% of your time in a classroom, is really fun. </p></li><li><p>When learning, I like being in the same room as the teacher. </p><ul><li><p>I&#8217;ve done live trainings where I&#8217;m a remote learner but there&#8217;s an in-person group, too. It seemed as if the in-person crowd was much more intimate, which I prefer.</p></li><li><p>Being able to interact with a teacher in the flesh, eye contact and all, is so much of a difference in my experience when learning. </p></li></ul></li><li><p>I get energized by those learning around me!</p><ul><li><p>All walks of life will likely be in your classes (management, executives, foreign government workers, tech company employees, security people, non-security people, etc.)</p></li><li><p>It&#8217;s motivating to me when I&#8217;m around other serious students. You can ask each questions and meet/get to know new faces. </p></li></ul></li></ul><p>While I chose that option for myself, the SEC504 course did have a remote cohort learning at the same time. Here are some things to be aware of with SANS&#8217; live, virtual class:</p><ul><li><p>The instructor teaching the class has a camera and microphone setup, so all students can see them, the slides/screenshare, and hear them clearly.</p></li><li><p>Designated chat apps, set up by SANS for students, is available to all for discussion and live asking of questions.</p></li><li><p>In SEC504, there was a designated Teaching Assistant. This person was highly qualified and able to help with answering of technical questions, assist with labs, etc.</p></li><li><p>Students attending remotely means that they can experience the live course from anywhere in the world.</p></li></ul><h4>SANS OnDemand </h4><p>No, you eagle-eyed reader, &#8220;OnDemand&#8221; is not missing a space! That&#8217;s how SANS has branded their online learning option.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-5" href="#footnote-5" target="_self">5</a></p><p>After completing the six-day SEC504 class I had the OnDemand course made available to me as part of my learning package. Just like the experience of in-person learning with SANS, this was my first time taking in their virtual material.</p><p>I was quite surprised by the quality of the OnDemand instruction! Particularly:</p><ul><li><p>*<strong>Zero difference in the amount of content or caliber of content!</strong></p><ul><li><p>I was in class for every minute of instruction while in-person and also watched the entirety of the OnDemand course. If anything, the OnDemand content held <em>more</em> detail than what I experienced live. </p></li><li><p>It gave me confidence that the virtual SANS experience could be just as powerful as the in-person one.</p></li></ul></li><li><p>High quality sound and video. The instructor is mic&#8217;d up at all times and, at least to me, understandable and clear.</p></li><li><p>Screen sharing is also clear, as are presentation slides.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://heroicpanda.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks so much for reading! I write this free of charge for all. Subscribe to show support and get notified of future posts.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p><br></p></li></ul><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!bMYx!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F996a43e2-b562-45a1-97db-cddadea9bd43_3200x1792.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!bMYx!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F996a43e2-b562-45a1-97db-cddadea9bd43_3200x1792.png 424w, https://substackcdn.com/image/fetch/$s_!bMYx!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F996a43e2-b562-45a1-97db-cddadea9bd43_3200x1792.png 848w, https://substackcdn.com/image/fetch/$s_!bMYx!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F996a43e2-b562-45a1-97db-cddadea9bd43_3200x1792.png 1272w, https://substackcdn.com/image/fetch/$s_!bMYx!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F996a43e2-b562-45a1-97db-cddadea9bd43_3200x1792.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!bMYx!,w_2400,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F996a43e2-b562-45a1-97db-cddadea9bd43_3200x1792.png" width="1200" height="671.7032967032967" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/996a43e2-b562-45a1-97db-cddadea9bd43_3200x1792.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:false,&quot;imageSize&quot;:&quot;large&quot;,&quot;height&quot;:815,&quot;width&quot;:1456,&quot;resizeWidth&quot;:1200,&quot;bytes&quot;:1138708,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://heroicpandasec.substack.com/i/182083831?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F996a43e2-b562-45a1-97db-cddadea9bd43_3200x1792.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:&quot;center&quot;,&quot;offset&quot;:false}" class="sizing-large" alt="" srcset="https://substackcdn.com/image/fetch/$s_!bMYx!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F996a43e2-b562-45a1-97db-cddadea9bd43_3200x1792.png 424w, https://substackcdn.com/image/fetch/$s_!bMYx!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F996a43e2-b562-45a1-97db-cddadea9bd43_3200x1792.png 848w, https://substackcdn.com/image/fetch/$s_!bMYx!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F996a43e2-b562-45a1-97db-cddadea9bd43_3200x1792.png 1272w, https://substackcdn.com/image/fetch/$s_!bMYx!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F996a43e2-b562-45a1-97db-cddadea9bd43_3200x1792.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h1>Studying &amp; Procrastination</h1><p>Studying has long been my nemesis. I&#8217;d like to assume, or, rather, choose to believe, that everyone else is like me and has difficulty studying on most days.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-6" href="#footnote-6" target="_self">6</a> Not being good at studying has less to do with being a good or bad student and more to do with motivation. If you don&#8217;t feel compelled to study or aren&#8217;t driven to study, then what&#8217;s the point? Why pretend to study if you&#8217;re not really getting anything done?</p><p>I have never been the best student. Go back in time and ask my 4th grade teacher and she&#8217;ll tell you the same.</p><p>Where I find success in learning new things is by separating out the motivation requirement and replacing it with discipline. I then couple discipline with the thing that I do best in this world: procrastinate.</p><p>Next I&#8217;ll breakdown how I studied and why I feel that procrastination is something to embrace.</p><h2>Studying</h2><h4>Study Materials</h4><p>For the GCIH exam I relied solely on the official study materials provided by SANS as part of the SEC504 course. These materials included:</p><ul><li><p>Printed course books </p><ul><li><p>For SEC504, I believe they totaled over +1,000 pages.</p></li><li><p>Digital copies are also made available to students.</p></li></ul></li><li><p>OnDemand course videos</p><ul><li><p>You may access course videos through the browser or through the phone app.</p></li><li><p>I found the phone app incredibly helpful as you can listen to just the audio or watch the videos like normal.</p></li></ul></li><li><p>Virtual machine (VM) files</p><ul><li><p>These were compressed, yet still quite sizeable. SANS gives you a heads up that you&#8217;ll need over 100 GB of hard drive space and they&#8217;re not kidding.</p></li><li><p>There were supplemental materials included, too, but the vast majority of what you download and install is VMs.</p></li></ul></li></ul><p>That was it! I didn&#8217;t see the need in purchasing or looking up additional materials not produced by SANS.</p><p>To be honest, I&#8217;ve had great luck with the official course materials for certifications. If the certification body (SANS, Cisco, CompTIA, etc.) publishes an official study guide (almost all of them do, by the way), then you know that you hold all of the information that could be found on the exam itself.</p><h4>Study Approach</h4><ol><li><p><strong>Watch or listen to the entire course via OnDemand.</strong></p><ol><li><p>I did this while shooting hoops, vacuuming, working out at the gym, and raking leaves. If you&#8217;re able to learn something from a podcast while performing another activity, then this could be a great for you, too.</p></li><li><p>The virtual course was incredibly rich with detail. It felt as if I was back in the in-person class.</p></li><li><p>The videos helped me realize what topics I was familiar with and, more importantly, which ones I was <em>not</em> familiar with. I&#8217;d be mowing grass or something, listening, only to stop midway through Joshua Wright speaking through my headphones. &#8220;Alright, so I definitely have no clue about pivoting&#8230;&#8221;. Those kinds of mental notes were so helpful.</p></li></ol></li><li><p><strong>Practice the hands-on labs.</strong></p><ol><li><p>I personally didn&#8217;t have to get the GCIH certification. I was more concerned with actually being able to <em>do</em> what&#8217;s covered in the material. The labs were my favorite part! </p></li><li><p>In Joshua Wright&#8217;s SEC504, he&#8217;s prepared a variety of labs ranging from bite-sized labs all the way to lengthy, meaty labs that involve multiple systems. In this case, there was bonus material included with each lab as well additional tips &#8216;n tricks in the labs themselves.</p></li><li><p>I cannot emphasize enough how important it is for you to gain familiarity with the material through hands-on work. </p></li></ol></li><li><p><strong>Create an &#8220;index&#8221; for use during the exam.</strong></p><ol><li><p>GIAC exams are notoriously open book. However, if you believe that you can waltz into an exam unprepared, believing you will be able to lookup every answer, you are dreadfully wrong. Those 4 hours go by faster than you may think. There&#8217;s simply too much material for you to not prepare at all. Do you think, without studying, that you can find a given answer amidst 1,000 pages or more?</p></li><li><p>If you&#8217;ve never heard of an &#8220;index&#8221; in this way, here, an <strong>index</strong> refers to a document you create that tells you where a particular topic, keyword, tool, or command is discussed within the SEC504 books. <strong>This is the trick to helping guide you as you thumb through materials come exam time</strong>. You can print this out and take it into the exam with you.</p></li><li><p>This took several hours. I didn&#8217;t do a marathon session of index creation. I chiseled away at it, bit by bit, thumbing through every page of the course material.</p></li></ol></li><li><p><strong>Take a practice exam *WITHOUT* an index</strong>. Yes, that is my advice!</p><ol><li><p>Why you should try the practice exam without an index:</p><ol><li><p>You&#8217;ll quickly get a taste for how prepared you actually are. When you hit questions you don&#8217;t know how to answer, what do you react? Do you get frustrated or anxious or anything like that? <strong>It&#8217;s critical to train your mind and body for how to handle situations where you&#8217;re uncomfortable (not knowing something) and are under pressure (time constraints + many more questions, possibly)</strong>.</p></li><li><p>You may be <em>familiar</em> with a topic or tool, but how much can you <em>execute </em>from memory? It&#8217;s like being on stage in an acting rehearsal and going off-book for the first time. There&#8217;s a massive gap between having your next line on the tip of your tongue versus <em>knowing</em> the lines and being able to perform when the time comes. </p></li></ol></li><li><p>I took the first practice exam <em>without</em> and index, knowing I wasn&#8217;t fully prepared at all. I&#8217;m not kidding when I say that those 4 hours went by faster than I could count while also being extraordinarily difficult to fight through. </p><ol><li><p>I did excellent with the written portion by looking everything up, yet I chewed up tons of exam time leaving no time at all for the several hands-on questions (aka <strong><a href="https://www.giac.org/cyberlive/">CyberLive</a></strong><a href="https://www.giac.org/cyberlive/"> in GIAC parlance</a>).</p></li><li><p>What was funny was how the hands-on portion felt like my most confident section, but I ran out of time leaving some questions unanswered. This was a valuable lesson in both preparedness and time management.</p></li></ol></li><li><p>Unless you&#8217;re just wicked smart (&#8220;wicked <em>smaht</em>&#8221; for my New England friends),<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-7" href="#footnote-7" target="_self">7</a>  you want to be well aware of your strengths and weaknesses. There&#8217;s no need to fool yourself into preparedness. Just take the time to prep and be willing to learn where your weaknesses lie, knowing you can then improve those areas.</p></li><li><p>Seriously, this is perhaps the best thing that I did and I learned so much.</p></li><li><p>I passed by the skin of my teeth and that was without completing a handful of CyberLive questions at the end. This showed me how much more I needed to study and how unprepared I truly was.</p></li></ol></li><li><p><strong>Take the 2nd practice exam a few days before the exam</strong>, this time *with* your freshy minted index.</p><ol><li><p>Don&#8217;t take a practice exam the day before and definitely not on the same day. Even if you don&#8217;t take advantage of the full 4-hour time period, completing an entire practice exam requires lots of mental exertion. You&#8217;ll be tired, both mentally and physically.</p></li><li><p>Taking it close to the exam allows you to treat it as a dress rehearsal for the real deal, while also giving yourself time to rest before the big test.</p></li></ol></li></ol><h2>Procrastination</h2><div class="pullquote"><p>&#8220;You can't just turn on creativity like a faucet. You have to be in the right mood. </p><p>What mood is that? Last-minute panic.&#8221;</p><p>-Bill Watterson</p></div><p>If you somehow are magical and do not procrastinate, (1) I don&#8217;t know how on Earth you do it, and (2) I know you&#8217;re most definitely not me. Growing up, I&#8217;d always heard mention of procrastination as a negative thing. I know I interject humor throughout these posts<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-8" href="#footnote-8" target="_self">8</a>, but there are potential positives to procrastinating! I love Psychology Today&#8217;s articles, including this one where they explore how <a href="https://www.psychologytoday.com/us/blog/meaningfull/202205/procrastination-can-be-good-skill-have">procrastination can be a good thing</a>.</p><p>Now that I&#8217;ve sold procrastination as an important skill, let me complain about why I hate it sometimes. Motivation is not permanent and us humans are biologically engineered to take the easy way out. </p><p>The couch and a Playstation sound like a lot more fun than reading those boring course books. Yes, of course you simply <em>must</em> rewatch all prior seasons of &#8220;Stranger Things&#8221; on Netflix prior to the series finale. Throwing back a brewski while watching the football players do football things is a heck of a lot more attractive than realizing you don&#8217;t know how to prevent name resolution in Nmap scans.</p><p>In my armchair-psychologist of an opinion, it&#8217;s about balance. </p><p>You should replace motivation in your studies with <em>discipline</em> instead. That way, it&#8217;s not about listening to your heart for when it&#8217;s time to get to work. No! You know that taking 20-30 minutes to practice labs or watch/listen to the course will help you more than doing nothing.</p><p>You&#8217;re not a machine, so you do require time to take your mind away from work, studying, or whatever else. Do non-security, non-study things: take a walk, play video games, lift weights, lay on the floor and count the ceiling tiles, soak in the glory that is <em>The Great British Baking Show</em>. Just like your body requires sleep, your brain requires rest, too. Procrastination can sometimes help steer you towards non-work activities as a means of balancing out your more brain-intensive activities.</p><p>Discipline is not easy, don&#8217;t get me wrong. And procrastination is something I struggle with, most definitely. As a tl;dr here:</p><ul><li><p><strong>If studying is hard for you, chunk out your study efforts in small increments</strong>. This has been huge for me! Work to do something related to your studies for 15, 20, or 30 minutes, then walk away. </p></li><li><p><strong>Make time to do things for yourself, don&#8217;t try to force your efforts.</strong> Garden, bake a cake, hang out with friends and family, hang out <em>away</em> from friends and family, just do something that recharges your brain batteries. Treat yo&#8217; self and refresh yo&#8217; self.</p></li></ul><p>Reframe &#8220;procrastination&#8221; away from something that&#8217;s purely negative and into something that, in moderation, can help you achieve greater success within your studies.</p><p>Procrastination is my best, natural talent, so let me know if you want any tips. :)</p><h1>Taking the GCIH Exam</h1><p>I chose to take my GCIH exam at a local testing center. It&#8217;s the same one that I went to for my Cisco CCNA years ago, so I was familiar with the location.</p><p>There are plenty of YouTube videos and Google results for choosing the best location for your exam, so I won&#8217;t go into that here. Personally, I wouldn&#8217;t spend too much energy worrying about what location to pick. Regardless of where you decide to go, you&#8217;ll be a larger room with multiple people and be using a PC with a standard keyboard/mouse at a tiny cubicle.</p><h2>Exam Tips &amp; Advice</h2><p>Based on my experience with this exam and others in the past, here are my recommendations:</p><ul><li><p><strong>Take off time from work</strong> for the test</p><ul><li><p>If you&#8217;re able to, take the day off of work. The exam is 4 hours long and you&#8217;ll need to travel to/from the testing center. That alone is a full day! </p></li></ul></li><li><p><strong>Select a time that works best </strong>for <em>your</em> daily routine</p><ul><li><p>Seems obvious, I know, but it&#8217;s important.</p></li><li><p>Consider: when you go to bed, what time you normally wake up, when/if you can take off work, how to accommodate schedules or your partner or dependents</p></li><li><p>For the GCIH, I selected a time that was an hour-ish before my normal lunchtime. I knew that an appointment late in the morning would give me time to sleep, time to eat a breakfast, and time for my coffee to kick in and give me magical, caffeine-powered intellectual energy (not a thing).</p></li></ul></li><li><p><strong>Schedule the exam far out enough for you to be sufficiently prepared</strong></p><ul><li><p>While you have permanent access to downloadable course materials and all of your printed materials, <strong>you have take your exam within four months!</strong></p></li><li><p>Some people prefer to take such exams very soon after the course, while some (like me) prefer the flexibility of scheduling it out into the future. </p><ul><li><p>A word of caution: Be UN-like me and don&#8217;t set aside the material for a long time after the class (which I did, unfortunately). Give yourself time, but keep the momentum with the material by picking an exam time that&#8217;s not <em>too</em> far out. If I had to do it again, I&#8217;d pick an exam like 1-2 months out from completion of the course.</p></li></ul></li></ul></li><li><p><strong>You can&#8212;and should&#8212;take breaks!</strong></p><ul><li><p>GIAC affords you 15 minutes of break time. This can be taken all at once or across a maximum of two breaks for a total of 15 minutes.</p></li><li><p>Honestly, I didn&#8217;t think I&#8217;d need them, but when I took a quick bathroom break about two hours in it felt amazing to stretch my legs.</p></li></ul></li></ul><h2>General advice</h2><ul><li><p><strong>Practice the material&#8212;Practice. Practice. Practice.</strong></p><ul><li><p>Practice can be reading. Practice can be creating/memorizing flashcards. Practice can be running a lab. Practice can be creating colorful tabs to attach to your books. There&#8217;s endless room for you to be creative and figure out what works best.</p></li><li><p>The point, though, is that you&#8217;re doing <em>something</em> with the material. Doing something is always better than nothing, right? So, do it!</p></li><li><p>I didn&#8217;t use flashcards for this test, but I know that many find them highly effective.</p></li></ul></li><li><p><strong>Strengthen areas of weakness, maintain areas of strength</strong><a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-9" href="#footnote-9" target="_self">9</a></p><ul><li><p>After you complete the course, immediately take note of where you&#8217;re weakest. This will be helpful as you&#8217;ll know what you need to work on more and what you may already be confident with.</p></li><li><p>For me, this was basically everything offensive: Hashcat, vulnerability exploitation (SQLi, SSRF, XSS, etc.).<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-10" href="#footnote-10" target="_self">10</a></p></li></ul></li></ul><div><hr></div><h1>My main takeaways from this experience</h1><p>The SEC504 course and the GCIH exam placed a glaring spotlight on my knowledge and skills as a security pro. </p><p>What I realized most was how much weight I had placed on <em>theoretical</em> knowledge versus <em>practical </em>knowledge. I knew what <a href="https://portswigger.net/web-security/sql-injection">SQL injection</a> was, in theory, but I hadn&#8217;t tried exploiting it before. I was familiar with the broader concepts of the <a href="https://csrc.nist.gov/projects/incident-response">incident response steps recommended by NIST</a>, but I hadn&#8217;t considered how an organization could work to move away from a purely linear process to introduce greater flexibility. I knew was <a href="https://www.metasploit.com/">Metasploit</a> was, yet I&#8217;d never really fired it up and used it before.</p><p>I&#8217;ve long been fascinated by hacking, so getting my hands dirty with some of the basic tools of the trade was just so, so fun. I loved it! I realized that the hands-on, practical portions of the course were my absolute favorite. </p><p>Overall, this experience was a blast. </p><p>Not only did I build some technical chops, I did so using offensive tools in a way that has bolstered my confidence as a security professional focused on defending others from harm. SEC504 doesn&#8217;t cover everything, not at all, but for me it was a big step in the right direction. I built upon existing theoretical knowledge and gained much more theory in new ways, all while solidifying a skillset I didn&#8217;t have before.</p><p></p><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-1" href="#footnote-anchor-1" class="footnote-number" contenteditable="false" target="_self">1</a><div class="footnote-content"><p>Budget constraints are one thing, but you should never be denied training  because you failed to provide enough justification. SANS holds your hand in this regard and gives you this info freely. Take advantage! It&#8217;s a cool offering, so take advantage.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-2" href="#footnote-anchor-2" class="footnote-number" contenteditable="false" target="_self">2</a><div class="footnote-content"><p>Defense has always been my specialty, even back in my elementary school basketball days (my basketball career was short-lived, okay?).</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-3" href="#footnote-anchor-3" class="footnote-number" contenteditable="false" target="_self">3</a><div class="footnote-content"><p>I know these text blocks are for quotes and I&#8217;m not really quoting myself, I just think it makes the text look pretty.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-4" href="#footnote-anchor-4" class="footnote-number" contenteditable="false" target="_self">4</a><div class="footnote-content"><p>I&#8217;m working hard to incorporate more nerdy humor. How am I doing? Please rate my humorous-ness on a scale of 5 to 5. Thank you.: <a href="https://www.imdb.com/title/tt0113243/quotes/?item=qt0448615">https://www.imdb.com/title/tt0113243/quotes/?item=qt0448615</a></p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-5" href="#footnote-anchor-5" class="footnote-number" contenteditable="false" target="_self">5</a><div class="footnote-content"><p>I guess they must&#8217;ve &#8220;spaced out&#8221;, eh? Get it? Because they removed a space. I&#8217;ll be here all week.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-6" href="#footnote-anchor-6" class="footnote-number" contenteditable="false" target="_self">6</a><div class="footnote-content"><p>If this is <em>not</em> you and you&#8217;re just super fantastic at studying all the time, thank you for not correcting me. </p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-7" href="#footnote-anchor-7" class="footnote-number" contenteditable="false" target="_self">7</a><div class="footnote-content"><p>I love <em>Good Will Hunting</em>! And while I&#8217;m kinda joking here, there are a lot of security pros out there who really know their stuff. Posturing like you know what you&#8217;re talking about, when you don&#8217;t, whether during exam time or IRL, will get you nowhere, because many people out there know enough to call your bluff. This clip is an awesome one: </p><div id="youtube2-N8vhv2Uinto" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;N8vhv2Uinto&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/N8vhv2Uinto?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-8" href="#footnote-anchor-8" class="footnote-number" contenteditable="false" target="_self">8</a><div class="footnote-content"><p>or, at least I try to &#128557;</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-9" href="#footnote-anchor-9" class="footnote-number" contenteditable="false" target="_self">9</a><div class="footnote-content"><p>This could be another point of advice where you say, &#8220;Duh, dude!&#8221; But, I never had anyone explain this to me. Back in my music days, this was a given, otherwise, what are you practicing?</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-10" href="#footnote-anchor-10" class="footnote-number" contenteditable="false" target="_self">10</a><div class="footnote-content"><p>Why, yes, this does mean that almost everything in SEC504 was new to me.</p></div></div>]]></content:encoded></item><item><title><![CDATA[fwd:cloudsec 2025 Conference - Cloud security is more important now than ever before]]></title><description><![CDATA[My takeaways & experiences from the fwd:cloudsec 2025 conference]]></description><link>https://heroicpanda.com/p/fwdcloudsec-2025-conference-cloud</link><guid isPermaLink="false">https://heroicpanda.com/p/fwdcloudsec-2025-conference-cloud</guid><dc:creator><![CDATA[Nathan Walker]]></dc:creator><pubDate>Sat, 05 Jul 2025 22:28:58 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!zwVF!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9b8dd027-0797-4672-a682-a6a1fef72ba3_1456x1048.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!zwVF!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9b8dd027-0797-4672-a682-a6a1fef72ba3_1456x1048.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!zwVF!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9b8dd027-0797-4672-a682-a6a1fef72ba3_1456x1048.png 424w, https://substackcdn.com/image/fetch/$s_!zwVF!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9b8dd027-0797-4672-a682-a6a1fef72ba3_1456x1048.png 848w, https://substackcdn.com/image/fetch/$s_!zwVF!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9b8dd027-0797-4672-a682-a6a1fef72ba3_1456x1048.png 1272w, https://substackcdn.com/image/fetch/$s_!zwVF!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9b8dd027-0797-4672-a682-a6a1fef72ba3_1456x1048.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!zwVF!,w_2400,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9b8dd027-0797-4672-a682-a6a1fef72ba3_1456x1048.png" width="1200" height="863.7362637362637" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9b8dd027-0797-4672-a682-a6a1fef72ba3_1456x1048.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:false,&quot;imageSize&quot;:&quot;large&quot;,&quot;height&quot;:1048,&quot;width&quot;:1456,&quot;resizeWidth&quot;:1200,&quot;bytes&quot;:304236,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://heroicpandasec.substack.com/i/167552051?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9b8dd027-0797-4672-a682-a6a1fef72ba3_1456x1048.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:&quot;center&quot;,&quot;offset&quot;:false}" class="sizing-large" alt="" srcset="https://substackcdn.com/image/fetch/$s_!zwVF!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9b8dd027-0797-4672-a682-a6a1fef72ba3_1456x1048.png 424w, https://substackcdn.com/image/fetch/$s_!zwVF!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9b8dd027-0797-4672-a682-a6a1fef72ba3_1456x1048.png 848w, https://substackcdn.com/image/fetch/$s_!zwVF!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9b8dd027-0797-4672-a682-a6a1fef72ba3_1456x1048.png 1272w, https://substackcdn.com/image/fetch/$s_!zwVF!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9b8dd027-0797-4672-a682-a6a1fef72ba3_1456x1048.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">fwd:cloudsec 2025 logo is designed by the Forward CloudSec Association (although I doubt they&#8217;d want to claim my graphic design abilities)</figcaption></figure></div><p>Life is interesting, isn&#8217;t it?</p><p>Our lives have a clever way of stimulating us through the experience of these funny things called &#8220;feelings&#8221;, whatever those are. These dastardly little emotions, as I&#8217;m told they are called, pop up throughout the day like a neverending haze of mental gnats in one&#8217;s noggin. </p><p>In <em>Atlas of the Heart</em>, Bren&#233; Brown provides a <a href="https://brenebrown.com/resources/atlas-of-the-heart-list-of-emotions/">list of 87 such feelings</a> that &#8220;define what it means to be human&#8221;; love, hurt, amusement, betrayal, pride, joy, fear, connection, reverence, humility, envy, belonging; that feeling one gets when they&#8217;re not sure whether they used a semicolon correctly or not. </p><p>Ever since I saw Clint Gibler&#8217;s opening keynote at BSidesSF 2025, &#8220;<a href="https://bsidessf2025.sched.com/event/1x8QU/sharing-vulnerabilities">Sharing Vulnerabilities</a>&#8221;<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-1" href="#footnote-1" target="_self">1</a>, I have been on this kick of trying to reframe the security profession in a more human light. In his talk, Clint challenged everyone to embrace the vulnerabilities of our humanity, not run away from them. I walked away from that talk thinking more about how security professionals should care to look out for one another&#8217;s humanity, just as much as we strive to protect and care for the focuses of our work.</p><p>The fwd:cloudsec 2025 conference did <em>not</em> have me experiencing most of the <a href="https://www.hopkinsmedicine.org/about/community-health/johns-hopkins-bayview/services/called-to-care/recognize-cope-with-negative-emotions">negative emotions</a> listed by Bren&#233;, but I did feel a wide range of emotions as I sat and listened to the material presented and most especially as I reflected on what I had learned.</p><p>In a feeble attempt at a segue, I wanted to share the feelings, thoughts, and takeaways I experienced at this year&#8217;s fwd:cloudsec 2025 conference.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://heroicpanda.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Security for the Rest of Us! Please consider subscribing and sharing your feedback.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h1>What is fwd:cloudsec?</h1><p>Pronounced, &#8220;Forward Cloud Sec&#8221;, fwd:cloudsec is the shorthand for the <a href="https://fwdcloudsec.org/">Forward CloudSec Association</a>, a 501&#169;(3)<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-2" href="#footnote-2" target="_self">2</a> non-profit organization focused on cloud security. fwd:cloudsec, founded in 2019, brings cloud security professionals together once a year for an annual conference, hosting an event in North America since 2020. 2024 saw the first year of a fwd:cloudsec conference in Europe.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-3" href="#footnote-3" target="_self">3</a> Full information and recordings for each talk are available through <a href="https://fwdcloudsec.org/conference/archive/2020/">their archives</a>. </p><p>This year&#8217;s North American conference was held in downtown Denver, Colorado, occupying the entire third floor of the Embassy Suites.</p><h2>The focus</h2><div class="pullquote"><p><strong>The types of things cloud practitioners want to know</strong></p></div><p>The <a href="https://fwdcloudsec.org/conference/north-america/#:~:text=fwd%3Acloudsec%20is,vendor%20conference%20schedule.">stated focus of fwd:cloudsec</a> is, &#8220;At this conference you can expect discussions about all the major cloud platforms, both attack and defense research, limitations of security features, the pros and cons of different security strategies, and generally <strong>the types of things cloud practitioners want to know, but that don't fit neatly into a vendor conference schedule</strong>.&#8221;</p><p>This truly was a practitioner-focused conference. All talks held technical content. All talks were given by security practitioners. Some talks were presented by founders/co-founders, yet all of those founders or business leaders were still practicing technologists. These ingredients came together nicely for two full days of talks that were relatable to practitioners.</p><p>fwd:cloudsec says that they are vendor agnostic and this proved true, as there were talks that covered all three of the major cloud service providers.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-4" href="#footnote-4" target="_self">4</a> </p><p>The non-profit entity also aims to provide support for open-source software, with several talks either mentioning the use of open source tooling or announcing the release of new open source projects.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-5" href="#footnote-5" target="_self">5</a></p><p>All talks were categorized according to one of the four categories created:</p><ul><li><p>Mapping the frontier: supporting new clouds and technology</p></li><li><p>Surveying the wilderness: attacks and vulnerabilities, defensive practices</p></li><li><p>Packing your gear: tools for operating safely</p></li><li><p>Forming a fellowship: organizations and community</p><ul><li><p>I think this category was lone-wolf as there was only one talk here</p></li></ul></li></ul><h2>The format</h2><p>Over the two-day conference, <strong>the majority of talks given were held in a <a href="https://en.wikipedia.org/wiki/Lightning_talk">&#8220;lightning&#8221;-style format</a>, covering a maximum of 20 minutes</strong>. This meant that both the talk itself and the question-and-answer session with the audience had to take place within that 20 minutes of time. </p><p>I enjoyed this format so much! The resulting experience for me was feeling as if the day had flown by while also feeling as if I had absorbed as much content as I possibly could. I took much more away from speakers trimming down talks to 20 minutes than I have at most conference where speakers soak up 50+ minutes of time. </p><p>By fwd:cloudsec prioritizing brevity, I think this forced speakers to chip away at unnecessary details and focus on what they thought were the most substantive bits of their subject matter. Some speakers had to cut out live demos for time, while some speakers limited spoken word in favor of demonstrations. </p><p>There were a handful of longer, 40-minute talks, which is a timeframe more in line with what you see at most conferences. I could tell that these speakers were handpicked, since they seemed experienced, knowledgeable, and well prepared for the time they were allotted. One first-time speaker, <a href="https://fwdcloudsec.org/conference/north-america/speakers.html#ecs-cape-hijacking-iam-amazon:~:text=Speaker-,Naor%20Haziz,-Naor%20Haziz%20is">Naor Haziz</a>, did such a nice job with his talk and live demo that I would&#8217;ve never known this was their first time speaking.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-6" href="#footnote-6" target="_self">6</a></p><p>The end result was a wide range of experiences as a listener where everything carried a meaningful focus, which made the event much more enjoyable.</p><p>And I don&#8217;t think I was alone in feeling this way, as many of the talks prompted insightful questions from the audience, a strong sign that attendees were engaged with material presented.</p><h2>The speakers</h2><p>Many different walks of life took the stage at fwd:cloudsec. I saw co-founders, CEOs, CTOs, security researchers, and security engineers, among others. These professionals came from companies large and small. The <a href="https://fwdcloudsec.org/conference/north-america/speakers.html">full list of speakers</a> at fwd:cloudsec 2025 is available for you to check out.</p><p>I don&#8217;t often enjoy talks given by speakers who are leaders at a company. This isn&#8217;t because their experiences are any less valid or that they don&#8217;t have technical skills to contribute (definitely not the case at fwd:cloudsec), it&#8217;s just that leaders often seem to aim their talks to other leaders; the primary goal is to catch the ear of a leader who makes purchasing decisions, not to keep the attention of a practitioner. However, I didn&#8217;t get that feeling at fwd:cloudsec, which was a wonderful surprise! The general vibe was much more like a local BSides that was aimed only at cloud security topics.</p><p>RSAC Conference and Black Hat USA loom over smaller security conferences like the behemoths that they are. I find myself hunting for meaningful talks to attend, often striking out and/or feeling as if the material lacked a practitioner&#8217;s focus. I didn&#8217;t get that feeling at fwd:cloudsec, as very little of the conference itself felt like a waste of time at all. If I was sitting in a room listening to a talk, I was soaking in something interesting about 85% of the time.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-7" href="#footnote-7" target="_self">7</a> Rarely, if ever, did I feel as if someone was talking over me simply because I didn&#8217;t hold decision making powers.</p><h1>Takeaways from fwd:cloudsec 2025</h1><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://images.unsplash.com/photo-1659088981163-7823b8d74fac?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0fHx0YWtlYXdheXxlbnwwfHx8fDE3NTE3NTIwMjl8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://images.unsplash.com/photo-1659088981163-7823b8d74fac?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0fHx0YWtlYXdheXxlbnwwfHx8fDE3NTE3NTIwMjl8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1659088981163-7823b8d74fac?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0fHx0YWtlYXdheXxlbnwwfHx8fDE3NTE3NTIwMjl8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1659088981163-7823b8d74fac?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0fHx0YWtlYXdheXxlbnwwfHx8fDE3NTE3NTIwMjl8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1659088981163-7823b8d74fac?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0fHx0YWtlYXdheXxlbnwwfHx8fDE3NTE3NTIwMjl8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1456w" sizes="100vw"><img src="https://images.unsplash.com/photo-1659088981163-7823b8d74fac?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0fHx0YWtlYXdheXxlbnwwfHx8fDE3NTE3NTIwMjl8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080" width="5905" height="3937" data-attrs="{&quot;src&quot;:&quot;https://images.unsplash.com/photo-1659088981163-7823b8d74fac?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0fHx0YWtlYXdheXxlbnwwfHx8fDE3NTE3NTIwMjl8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:3937,&quot;width&quot;:5905,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;a purple light in a dark room&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="a purple light in a dark room" title="a purple light in a dark room" srcset="https://images.unsplash.com/photo-1659088981163-7823b8d74fac?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0fHx0YWtlYXdheXxlbnwwfHx8fDE3NTE3NTIwMjl8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1659088981163-7823b8d74fac?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0fHx0YWtlYXdheXxlbnwwfHx8fDE3NTE3NTIwMjl8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1659088981163-7823b8d74fac?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0fHx0YWtlYXdheXxlbnwwfHx8fDE3NTE3NTIwMjl8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1659088981163-7823b8d74fac?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0fHx0YWtlYXdheXxlbnwwfHx8fDE3NTE3NTIwMjl8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Photo by <a href="true">Ambitious Studio* | Rick Barrett</a> on <a href="https://unsplash.com">Unsplash</a></figcaption></figure></div><h2>IAM is a big, big problem</h2><p>&#8230;and IAM not kidding around when I say that.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-8" href="#footnote-8" target="_self">8</a> </p><p>Identity and access management (<a href="https://en.wikipedia.org/wiki/Identity_and_access_management">IAM</a>) is a massive problem regardless of company size, industry vertical, or the cloud service provider in question. Talk to any security engineer with any amount of experience and I&#8217;d bet they would agree with the sentiment that IAM is hard and that there&#8217;s no one-size-fits-all approach to the problems that IAM present.</p><p>Nine different talks included explicit mentions of IAM in their title or in the abstract of their talk. So out of 42 talks, over 20% of the them involved IAM as a direct point of focus. </p><p>This comes as no surprise to security practitioners, who all seem to struggle with the complexities and nuances of IAM permissioning. Jason Kao, founder of a cloud security startup,  shed light on the fact that Amazon Web Services alone offers 18,000+ permissions for use across 200+ services in his talk, "<a href="https://fwdcloudsec.org/conference/north-america/speakers.html#duplicitous-nature-of-aws-iam">The Duplicitous Nature of AWS Identity and Access Management (IAM)</a>&#8221;. That&#8217;s an insane amount of configuration options, which means that there is an incredible amount of room for misconfiguration. Now, what if you have a multi-cloud presence, or if your company engages with more than one cloud service provider? The complexities involved increase exponentially. In Jason Kao&#8217;s case, he outlined how AWS alone provides extreme granularity, but how the granularity itself can make application of that granularity quite challenging.</p><p>I&#8217;m not sure what I was expecting, but I can say that I didn&#8217;t expect to hear so much &#8220;IAM&#8221; speak at a technical conference. I guess it helped to remind of just how technical IAM is and can be, with a reassuring nod from others, a pat on the back that no one has this whole IAM thing figured out.</p><blockquote><p><strong>IAM is hard</strong></p></blockquote><p>As we&#8217;re all pushed to adopt new technologies faster and to create and push out new products more quickly, we have to understand that it&#8217;s paramount to include proper permissioning. The final 40-minute talk I heard, &#8220;<a href="https://fwdcloudsec.org/conference/north-america/speakers.html#what-would-you-ask-crystal-for">What would you ask a crystal ball for AWS IAM?</a>,&#8221; by Netflix&#8217;s Nick Siow, gave me two takeaways:</p><ol><li><p>IAM is hard and it&#8217;s especially hard at scale, and</p></li><li><p>It takes keen, focused effort and the willingness to tackle IAM head-on as a technical challenge.</p></li></ol><p>I&#8217;m definitely guilty of placing IAM towards of the bottom on my mental list of &#8220;cool things in tech&#8221;. This year&#8217;s conference has me looking at IAM with a new level of importance.</p><h2>There&#8217;s no escape! Oh wait, whoops. Yes there is&#8230;</h2><p>I saw two talks centered around &#8220;escapes&#8221; of different kinds: (1) container escape, and (2) hijacking, or, &#8220;escaping&#8221; low-privilege roles to take on higher-privileged roles from other containers.</p><p>The <a href="https://fwdcloudsec.org/conference/north-america/speakers.html#good-bad-ugly-hacking-3-csps-1">first talk on escaping</a>, reported and presented by researchers at Wiz, was a pretty cool one, featuring a container escape vulnerability present in NVIDIA&#8217;s container toolkit. Because this toolkit has been widely adopted, it allowed the researchers to hack 10 different cloud service providers (CSPs) through this one vulnerability. The presenter, Andres Riancho, talked about their experiences with three different CSPs out of the 10 involved, Azure, Replicate, and Digital Ocean. It was interesting to hear how each provider reacted differently (Replicate&#8217;s blue team detected the lateral movement, shutting them down) and how far they were able to go with each verified exploit (Digital Ocean&#8217;s environment allowed for full service takeover). The full service takeover hearkens back to IAM and permissions, as permission limits were not set to prevent the hack from being successful (like Azure, where they were unable to gain cross-tenant access).</p><ul><li><p>Check out Wiz&#8217;s full blog post for full details, <strong><a href="https://www.wiz.io/blog/nvidia-ai-vulnerability-deep-dive-cve-2024-0132">How Wiz found a Critical NVIDIA AI vulnerability:&#8239; Deep Dive into a container escape (CVE-2024-0132)</a></strong></p></li></ul><p>In the second talk, <a href="https://fwdcloudsec.org/conference/north-america/speakers.html#ecs-cape-hijacking-iam-amazon">ECS-scape - Hijacking IAM Privileges in Amazon ECS</a>, Naor Haziz did an interesting deep dive into how he was able to discover a similarly over-permissive state with containerized environments. As a new speaker, Naor was wonderfully engaging, tossing in lots of humor on top of his technical talk that culminated in a short demo of the exploit. Here, similar to above, a lack of hardening made the attack possible. He offered advice for general protections against this:</p><ol><li><p>implement task-level hardening</p></li><li><p>minimize task role permissions</p></li><li><p>separate high-privilege and low-privilege workloads</p></li></ol><p>Isn&#8217;t it funny how containers, something <em>intended</em> to house something else, was the thing highlighted multiple times as being <em><strong>unable</strong></em> to successfully house something else? </p><h2>The &#8216;S&#8217; in LLM stands for &#8216;security&#8217;</h2><p>As in, there is no security in LLMs.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-9" href="#footnote-9" target="_self">9</a> That&#8217;s a phrase pulled off of a slide during Jeremy Snyder&#8217;s talk, &#8220;<a href="https://www.reddit.com/r/CyberStuck/">Challenges Around AI-as-a-service Logging</a>&#8221; (I wish I was that clever).</p><p>I wasn&#8217;t shocked to see that AI crept up many times across the talks I listened to. The rest of the world is doused in AI so it would make sense that security professionals are, too. </p><p>Considering the logs of AI services, Jeremy Snyder, founder and CEO of <a href="https://www.firetail.ai/">FireTail</a>, painted a picture of a task that&#8217;s seemingly impossible&#8212;getting proper logs of AI services used across your company and workforce. Snyder talked about how difficult it was to both collect logs and to analyze logs dynamically. Gathering logs is a challenge because you can&#8217;t log what you don&#8217;t know exists (&#8220;shadow AI&#8221;, services unknown to security and IT teams). </p><p>Then, automating analysis across logs is tough because, as he outlined, there are vast inconsistencies in logs from service to service, then even inconsistencies across the same logs in the same services.</p><blockquote><p><strong>Estimated that 90% of AI use across companies falls under shadow AI</strong></p></blockquote><p>If you&#8217;re reading this and thinking that endpoint-based solutions are the answer here, there are issues with that approach. Namely, you&#8217;re at the mercy of the logging mechanisms for whatever endpoint security agent or <a href="https://en.wikipedia.org/wiki/Data_loss_prevention_software">DLP</a> system you have in place. Snyder described how endpoint agents are great at capturing network requests made, but usually truncate log data to limit the amount of bandwidth needed to send that data to the main system. </p><p>The point I appreciated most was when he said, &#8220;Things are likely to get worse before they get better.&#8221; I didn&#8217;t view that statement through the lense of FUD (fear, uncertainty, and doubt). I took it as a refreshing bit of honesty because I feel that he&#8217;s right. Security practitioners need to be ready in case things don&#8217;t magically improve on their own. And, even if they&#8217;re not prepared in full, the acceptance of things getting potentially worse can allow them to move on more quickly towards solutions when going gets tough.</p><div class="pullquote"><p><strong>&#8220;Things are likely to get worse before they get better.&#8221;</strong></p></div><p>The atmosphere of modern business is rich in its thirst for adopting new technologies and scarce in desire to secure those new technologies. I know, I know, we need to move quickly, scale more aggressively, and pump out products so our businesses can grow, but at what cost, in terms of security? I&#8217;d argue that the cost is incalculable because you can&#8217;t calculate what you don&#8217;t know, simply because there are so many unknown-unknowns when it comes to securing AI.</p><p>I know I mentioned &#8220;FUD&#8221; before and I surely do not want to be a contributor to that! I strongly believe that it&#8217;s possible to embrace the potential power of new technologies while still allowing yourself to think critically. </p><h2>Hey, no worries, AI don&#8217;t know what I&#8217;m doing either</h2><p>Get it? &#8220;AI&#8221; instead of the word &#8220;I&#8221;? <em>Ugh</em>, <em>maybe this is a sign that I need to wrap things up</em>&#8230;</p><p>When it comes to AI, I was comforted by the realization that no one speaker has perfected it within the realm of cloud security. And, let&#8217;s face it, since 99.9% of us are using AI-as-a-Service tools, all of those fancy AI apps fall under the umbrella of cloud security. There were a few talks at fwd:cloudsec that discussed how to approach securing AI, plus how to incorporate AI into security-type tasks.</p><p>Jake Berkowsky of Snowflake described how to approach MCP server security in his talk, &#8220;<a href="https://fwdcloudsec.org/conference/north-america/speakers.html#securing-remote-mcp-servers">Securing Remote MCP Servers</a>&#8221;<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-10" href="#footnote-10" target="_self">10</a>. He mentioned <a href="https://modelcontextprotocol.io/introduction">MCP servers</a> as simply a spec for writing APIs with documentation built-in; while it is technically a new thing, his point was that we should just look at it through the view of API security, not as something completely unknown. Berkowsky advised the use of an API gateway to offer protection and inspection, plus the incorporation of session restrictions at both the server and client levels. </p><p>One really neat talk centered on how to train LLMs to detect anomalous activity in cloud logs. <a href="https://fwdcloudsec.org/conference/north-america/speakers.html#taming-llms-to-detect-cloud">Yigael Berger</a>, technologist and entrepreneur, walked the audience through how LLMs take in log data, how they might handle structured log data, and how they can be trained to handle log data more effectively. Using a tool called <a href="https://poloclub.github.io/transformer-explainer/">Transformer Explainer</a>, Yigael showed how changes to the context provided to the LLM generate different levels of probability for the &#8220;correct&#8221; output. He showed how he has found increased success with LLM-assisted log analysis by using LLMs that are trained specifically for logs. He acknowledged that this wasn&#8217;t a perfect process, since any changes to the logs themselves would necessitate a retraining of the underlying model used for analysis, which isn&#8217;t a scalable process at the moment. However, his talk gave me hope that future LLMs could help security teams/security products pull out meaningful insights from structured data more easily.</p><p>We use AI to write the code for new things, we leverage AI to help secure those things, then it&#8217;s only natural for us to use AI to analyze logs for everything right? </p><h2>GRC, representing at a cloud security conference?</h2><p>I was pleasantly surprised to see AJ Yawn&#8217;s name pop up on the fwd:cloudsec schedule, and not only was I surprised to see his name (as a GRC pro &amp; person of influence) but I was excited to see that he&#8217;d be talking about GRC Engineering.</p><p>In his talk, &#8220;<a href="https://fwdcloudsec.org/conference/north-america/speakers.html#introducing-grc-engineering-of">Introducing GRC Engineering: A New Era of AWS Compliance</a>&#8221;, AJ came right out and said that GRC is changing and that GRC professionals have a unique opportunity to level up their technical game. Instead of coming in after the fact, through audits and reviews, or before the fact, through planning and policy, there&#8217;s space for GRC pros to insert compliance mechanisms directly into the tech stack. Rather than making recommendations that tech teams implement, GRC people can take the bull by the horns and equip themselves to implement such compliance checks themselves. He had some harsh criticism about SOC 2 audits<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-11" href="#footnote-11" target="_self">11</a> that I agree with, but his main point was that SOC 2 control checks identify many things that could be automated or auto-detected prior to the audit. He&#8217;s advocating for GRC teams to be engineering <em>enablers</em>, not a burden to engineering staff come audit time.</p><p>I&#8217;d be remiss if I didn&#8217;t callout how AJ&#8217;s talk coincided with the release of his new book, <em><a href="https://grcengineeringbook.com/">GRC Engineering for AWS</a>. </em>Check it out and connect with AJ on LinkedIn. I&#8217;m sure he&#8217;d love to hear feedback on the book.</p><h1>Overall, a fantastic conference</h1><p>Remember when I talked about feelings earlier?</p><p>I felt a range of feelings while attending fwd:cloudsec:</p><ul><li><p><strong>Wonder</strong></p><ul><li><p>There are a lot of really smart people out there in the world. Most of the talks were impressive, both in terms of substance and speaking ability.</p></li></ul></li><li><p><strong>Comparison</strong></p><ul><li><p>I&#8217;ll be honest&#8212;I see the work of others and I immediately compare it what I do, or what my team is doing. That leads to other feelings, but, if I&#8217;m honest, I feel it! </p></li><li><p>I found myself thinking, how does what I&#8217;m hearing compare to what we&#8217;re doing? What are we doing right? What could we improve, based on this info?</p></li></ul></li><li><p><strong>Trust</strong></p><ul><li><p>I felt as if I could trust the word of the speakers I listened to and the people that I chatted with. You can recognize when someone&#8217;s on top of their game, and if they&#8217;re willing to share some wisdom with you then you better be open to learning!</p></li></ul></li><li><p><strong>Belonging/Connection</strong></p><ul><li><p>As a chronic sufferer of <a href="https://www.psychologytoday.com/us/basics/imposter-syndrome">imposter syndrome</a>, I relish opportunities to feel as if I belong. At fwd:cloudsec, the overall vibe, the friendliness of individuals and vendors, and the talks themselves made me feel as if I belong. Not necessarily that I&#8217;m on par with the technical abilities of the people I&#8217;m surrounded by, but that my existence as a security practitioner matters.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-12" href="#footnote-12" target="_self">12</a></p></li><li><p>That feeling of belonging is powerful. I found myself wanting other people in the security world to feel it, too.</p></li></ul></li><li><p><strong>Excitement</strong></p><ul><li><p>In general, I walked away from fwd:cloudsec excited about the possibilities of the cloud security space and the work being done from all kinds of security professionals.</p></li><li><p>I&#8217;m motivated to continue learning and dive back into some cloud-focused studies.</p></li></ul></li></ul><p>While I think that <a href="https://bsidessf.org/">BSides San Francisco</a> is the absolute best bang-for-your-buck security conference in existence<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-13" href="#footnote-13" target="_self">13</a>, I now have to say that fwd:cloudsec comes in at a close second. For just over $100 USD, you get two days chock full of talks. </p><p>Did I mention that the lunches were delicious? Who knew that you could eat a salad for lunch and still have an awesome day?<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-14" href="#footnote-14" target="_self">14</a></p><p>But seriously, overall, I found this conference to be an amazing experience that was well worth the trip. In two days&#8217; time I got to listen to several talks, meet new professionals, and actually enjoy a conference where vendors weren&#8217;t literally grabbing you to pull in sales leads. </p><p>So, massive kudos to the Forward CloudSec Association for the conference product you put on for others. I&#8217;m already looking forward to next year.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://heroicpanda.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Again, thanks for giving my blog a read. If you&#8217;d like, please consider subscribing! And if not, no worries - thank you for letting me share my work with you.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-1" href="#footnote-anchor-1" class="footnote-number" contenteditable="false" target="_self">1</a><div class="footnote-content"><p>Sorry, I&#8217;ve looked everywhere for a recording of this talk! If I find it, I will share it, because it&#8217;s surely one of the best conference talks I&#8217;ve ever experienced.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-2" href="#footnote-anchor-2" class="footnote-number" contenteditable="false" target="_self">2</a><div class="footnote-content"><p>Yes, I know that&#8217;s a &#8220;copyright&#8221; symbol. Substack apparently was not built for us to talk about non-profit entities.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-3" href="#footnote-anchor-3" class="footnote-number" contenteditable="false" target="_self">3</a><div class="footnote-content"><p>You are correct&#8212;I said &#8220;once a year&#8221; while talking about something that happens twice a year. I&#8217;m only human, you know.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-4" href="#footnote-anchor-4" class="footnote-number" contenteditable="false" target="_self">4</a><div class="footnote-content"><p>Those being Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP).</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-5" href="#footnote-anchor-5" class="footnote-number" contenteditable="false" target="_self">5</a><div class="footnote-content"><p>The conference <em>just</em> happened, so videos haven&#8217;t been posted and I can&#8217;t link the videos with new open source tools just yet.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-6" href="#footnote-anchor-6" class="footnote-number" contenteditable="false" target="_self">6</a><div class="footnote-content"><p>Their live demo sparked applause from the audience, giving it a feeling of something more relaxed, akin to DEF CON, where there&#8217;s a great appreciation for successful exploit demos.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-7" href="#footnote-anchor-7" class="footnote-number" contenteditable="false" target="_self">7</a><div class="footnote-content"><p>I only had to take one math course across two music degrees, so take my math-ing as you will.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-8" href="#footnote-anchor-8" class="footnote-number" contenteditable="false" target="_self">8</a><div class="footnote-content"><p>Tips are accepted for all great jokes that I make. I wonder why my tip jar for this is always empty, though&#8230; hmm&#8230;</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-9" href="#footnote-anchor-9" class="footnote-number" contenteditable="false" target="_self">9</a><div class="footnote-content"><p>Aw man, did I just explain the joke? I&#8217;ll do better, I promise.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-10" href="#footnote-anchor-10" class="footnote-number" contenteditable="false" target="_self">10</a><div class="footnote-content"><p>I&#8217;m super good at stating the obvious.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-11" href="#footnote-anchor-11" class="footnote-number" contenteditable="false" target="_self">11</a><div class="footnote-content"><p>&#8220;SOC 2 is a joke&#8221; was the quote, I believe, but I definitely agree that there&#8217;s a huge need for change. The AICPA, the accounting body that sets the SOC 2 compliance framework, has really dropped the ball when it comes to keeping the framework up to date and reigning in disreputable audit firms. The result is a cheapened audit product that is lowering the quality of SOC 2 audits across the board.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-12" href="#footnote-anchor-12" class="footnote-number" contenteditable="false" target="_self">12</a><div class="footnote-content"><p>I feel like I&#8217;m being a little vague here, but hopefully you understand what I&#8217;m getting at.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-13" href="#footnote-anchor-13" class="footnote-number" contenteditable="false" target="_self">13</a><div class="footnote-content"><p>I mean, c&#8217;mon, it&#8217;s $25 USD for (1) an entire weekend of security-focused content from some of the largest names in the industry, (2) a free professional headshot, and (3) free breakfast and lunch. Can you beat it? I don&#8217;t think so.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-14" href="#footnote-anchor-14" class="footnote-number" contenteditable="false" target="_self">14</a><div class="footnote-content"><p>He says, cancelling his Five Guys order.</p></div></div>]]></content:encoded></item><item><title><![CDATA[The 2025 Verizon Data Breach Investigations Report (Report)]]></title><description><![CDATA[Because the only thing better than beautifully-written analysis is a less-resourced person performing analysis on that analysis]]></description><link>https://heroicpanda.com/p/the-2025-verizon-data-breach-investigations</link><guid isPermaLink="false">https://heroicpanda.com/p/the-2025-verizon-data-breach-investigations</guid><dc:creator><![CDATA[Nathan Walker]]></dc:creator><pubDate>Fri, 06 Jun 2025 12:51:51 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!1kBf!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc69f152a-6881-4f42-a8e6-b11dd5e745bd_2240x1260.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!1kBf!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc69f152a-6881-4f42-a8e6-b11dd5e745bd_2240x1260.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!1kBf!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc69f152a-6881-4f42-a8e6-b11dd5e745bd_2240x1260.png 424w, https://substackcdn.com/image/fetch/$s_!1kBf!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc69f152a-6881-4f42-a8e6-b11dd5e745bd_2240x1260.png 848w, https://substackcdn.com/image/fetch/$s_!1kBf!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc69f152a-6881-4f42-a8e6-b11dd5e745bd_2240x1260.png 1272w, https://substackcdn.com/image/fetch/$s_!1kBf!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc69f152a-6881-4f42-a8e6-b11dd5e745bd_2240x1260.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!1kBf!,w_2400,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc69f152a-6881-4f42-a8e6-b11dd5e745bd_2240x1260.png" width="1200" height="675" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c69f152a-6881-4f42-a8e6-b11dd5e745bd_2240x1260.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:false,&quot;imageSize&quot;:&quot;large&quot;,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:1200,&quot;bytes&quot;:1454722,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://heroicpandasec.substack.com/i/163812855?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc69f152a-6881-4f42-a8e6-b11dd5e745bd_2240x1260.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:&quot;center&quot;,&quot;offset&quot;:false}" class="sizing-large" alt="" srcset="https://substackcdn.com/image/fetch/$s_!1kBf!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc69f152a-6881-4f42-a8e6-b11dd5e745bd_2240x1260.png 424w, https://substackcdn.com/image/fetch/$s_!1kBf!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc69f152a-6881-4f42-a8e6-b11dd5e745bd_2240x1260.png 848w, https://substackcdn.com/image/fetch/$s_!1kBf!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc69f152a-6881-4f42-a8e6-b11dd5e745bd_2240x1260.png 1272w, https://substackcdn.com/image/fetch/$s_!1kBf!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc69f152a-6881-4f42-a8e6-b11dd5e745bd_2240x1260.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Summer has descended upon us here in the United States and the flowers are welcoming the season in full bloom. Unless, of course, said flowers have the unfortunate privilege of being under my personal care, where&#8212;it pains me to say&#8212;many plants have fallen victim to my lack of care. </p><p>Regardless, I noticed the other day how some of my flowers that <s>are somehow still alive</s> have bloomed recently are blooming later than others. These flowers are no less beautiful than the flowers that blossomed earlier in the season, they are, you know, just fashionably late to the party. </p><p>Some people, like our fauna friends, are anticipatory and able to glide into the currents of the time at their peak. Does this make the late bloomers any less meaningful? No, not at all. In fact, late bloomers often bloom after many other blossoms have faded. It&#8217;s as if different kinds of plants are in an ecological tag team match, trading places to maximize effectiveness from those precious rays of sun. </p><p>And so, just like how some flowers bloom late in the season yet still thrive, and just like how my voice didn&#8217;t drop until sophomore year and yet I somehow survived high school, I present you with writings that come <em>after</em> the <a href="https://www.google.com/search?q=2025+verizon+dbir+blog">cool kids have already done the same</a>. </p><p>Together we will walk through the Verizon Data Breach Investigations Report to explore the findings uncovered within. I&#8217;ll also share some opinions of my own because, well, this is a blog and what good would a blog be without opinions? I didn&#8217;t just scan headings in an attempt to point out the obvious, I sat down to look for specifics in the report that jumped out to me, hoping to find points to elaborate on and discuss.</p><p>The goal was to organize my notes into something useful that could help guide someone else&#8217;s understanding of the full report. An analysis of the analysis, a study of the study, an investigation into the investigation, an examination of the actual examination, a breakdown of the lowdown as written through the voice of a security practitioner with too much time on their hands.</p><p>I now introduce you to the Verizon 2025 Data Breach Investigations Report (Report). </p><p>This one&#8217;s for you, fellow late bloomers.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://heroicpanda.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks so much for reading Security for the Rest of Us! If you enjoy my work, please consider subscribing for free.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><div><hr></div><h1>The Verizon 2025 Data Breach Investigations Report (Report)</h1><p>Like the annuals freshly planted each year, Verizon gifts the cybersecurity community with an annual, crisp, ever-so-creatively designed report called the <a href="https://www.verizon.com/business/resources/reports/dbir/">Data Breach Investigations Report</a> (DBIR&#8212;I&#8217;ll refer to it as &#8220;DBIR&#8221; from here on out). And, in a world that grows more and more concerned with cybersecurity, this report provides security practitioners and leaders with valuable insight into real-world incidents. Data driven, statistical information is critical for security leaders as they communicate with business leaders, boards, and communities.</p><p>These insights aren&#8217;t conjecture on the part of Verizon. No, not at all! They are backed up by cold, hard data supplied by a variety of cybersecurity industry partners.</p><h2>First, some housekeeping</h2><p>The Verizon team includes guidance on how to properly cite the data, graphs, facts and figures for those individuals who would like to cite their report (hey, they&#8217;re talking about me!). I must cite the source of this write-up as the &#8220;Verizon 2025 Data Breach Investigations Report&#8221;. It&#8217;s been a million years since I looked up how to formally cite something, so, here goes: <strong>aside from a few smidgens of outside sources, everything in this article is sourced from the Verizon 2025 Data Breach Investigations Report. </strong>I do like to define words with links to additional material and the inclusion of such resources, aside from the DBIR, will be clear.</p><p>The Verizon team also points out a few more important details when it comes to referencing the report:</p><ul><li><p><strong>They ask that people not directly distribute the report</strong> (as much as I would like to)</p><ul><li><p>Go to <a href="https://verizone.com/dbir">https://verizon.com/dbir</a>, enter your name and email, and a PDF magically appears </p></li></ul></li><li><p><strong>&#8220;Exact quotes are permitted, but paraphrasing requires review.&#8221;</strong></p><ul><li><p>I will include quotes and aim to make it clear when I&#8217;m offering my own information as additional color to the Verizon data</p></li><li><p>I&#8217;ll put on my best-fitting journalist pants here and make sure to do this properly</p><ul><li><p>No, I don&#8217;t actually know what &#8220;journalist pants&#8221; are. Are those made by <a href="https://jnco.com/">JNCO Jeans</a><a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-1" href="#footnote-1" target="_self">1</a>?</p></li><li><p>Verizon, please yell at me as appropriate.</p></li></ul></li></ul></li><li><p><strong>Figures and graphs are free to use</strong>, as long as they&#8217;re presented as they are in the report.</p></li></ul><p>Basically, anyone can use the DBIR as a source as long as proper citation is provided, as requested, and that the materials found in the report are not altered in anyway. This is why they ask to review any paraphrasing, aiming to preserve the integrity of the report itself.</p><p><strong>Do yourself a favor - stop, take a second, then <a href="https://verizon.com/dbir">download the full report</a>! </strong>My poor man&#8217;s prose may have already turned you away, but I promise that the original report is well worth your time. If you do keep reading (hugs to you), you can look the information up yourself as we move along.</p><p>Alright, enough housekeeping. Let&#8217;s get this party going! </p><h1>A picture is worth a thousand words</h1><p>Does anyone know who actually said that line? I sure can&#8217;t find anything.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-2" href="#footnote-2" target="_self">2</a> </p><p>Anyway&#8230;</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!JsVS!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4decdd45-585c-4899-8f08-56b95cb3ca67_770x978.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!JsVS!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4decdd45-585c-4899-8f08-56b95cb3ca67_770x978.png 424w, https://substackcdn.com/image/fetch/$s_!JsVS!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4decdd45-585c-4899-8f08-56b95cb3ca67_770x978.png 848w, https://substackcdn.com/image/fetch/$s_!JsVS!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4decdd45-585c-4899-8f08-56b95cb3ca67_770x978.png 1272w, https://substackcdn.com/image/fetch/$s_!JsVS!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4decdd45-585c-4899-8f08-56b95cb3ca67_770x978.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!JsVS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4decdd45-585c-4899-8f08-56b95cb3ca67_770x978.png" width="428" height="543.6155844155844" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/4decdd45-585c-4899-8f08-56b95cb3ca67_770x978.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:978,&quot;width&quot;:770,&quot;resizeWidth&quot;:428,&quot;bytes&quot;:48822,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://heroicpandasec.substack.com/i/163812855?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4decdd45-585c-4899-8f08-56b95cb3ca67_770x978.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!JsVS!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4decdd45-585c-4899-8f08-56b95cb3ca67_770x978.png 424w, https://substackcdn.com/image/fetch/$s_!JsVS!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4decdd45-585c-4899-8f08-56b95cb3ca67_770x978.png 848w, https://substackcdn.com/image/fetch/$s_!JsVS!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4decdd45-585c-4899-8f08-56b95cb3ca67_770x978.png 1272w, https://substackcdn.com/image/fetch/$s_!JsVS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4decdd45-585c-4899-8f08-56b95cb3ca67_770x978.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">&#8220;Dependency&#8221; - XKCD Webcomic: https://xkcd.com/2347/</figcaption></figure></div><p>In August 2020, Randall Munroe hit the nail on the head with his comic, &#8220;Dependency&#8221;, published on his marvelously simplistic website, <a href="https://xkcd.com">XKCD.com</a>. &#8220;Dependency&#8221; is a funny comic, sure, especially if you&#8217;re at all familiar with what <a href="https://www.ibm.com/think/topics/open-source#:~:text=Open%20source%20software%20(OSS)%20is%20source%20code%20developed%20and%20maintained%20through%20open%20collaboration.%20Anyone%20can%20use%2C%20examine%2C%20alter%20and%20redistribute%20OSS%20as%20they%20see%20fit%2C%20typically%20at%20no%20cost.">open source software</a> is and how the for-profit software sector relies on <a href="https://owasp.org/www-project-open-source-software-top-10/">way too much on freely available software packages</a>.</p><p>Where Munroe hits the bullseye dead in the center is in depicting the size of an individual piece of open source software in proportion to the rest of the software product that relies on it. The first half of the joke is that all of the digital realm is overly reliant on a tiny piece of software outside of their control, with the second part of the joke being that some hapless Midwesterner is keeping that code up to date with no recompense at all from companies profiting off of their work (oh god, did I just explain a joke&#8230; yikes, sorry about that).</p><p>The comic above can be used to tell the story of other critical dependencies in tech, too. That&#8217;s where the artwork for the Verizon 2025 DBIR comes in. </p><p>No, the cover art for this blog post isn&#8217;t the original art (you&#8217;re just all the unlucky victims of an affordable subscription to Canva and the fact that I do not have a social life). </p><p>Look at the actual DBIR cover and see if you can spot any similarities between Munroe&#8217;s &#8220;Dependency&#8221; comic and what the artists chose to illustrate:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!7o9L!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F405f0267-4eab-4a24-b36d-6c93fb664d35_1600x2074.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!7o9L!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F405f0267-4eab-4a24-b36d-6c93fb664d35_1600x2074.png 424w, https://substackcdn.com/image/fetch/$s_!7o9L!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F405f0267-4eab-4a24-b36d-6c93fb664d35_1600x2074.png 848w, https://substackcdn.com/image/fetch/$s_!7o9L!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F405f0267-4eab-4a24-b36d-6c93fb664d35_1600x2074.png 1272w, https://substackcdn.com/image/fetch/$s_!7o9L!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F405f0267-4eab-4a24-b36d-6c93fb664d35_1600x2074.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!7o9L!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F405f0267-4eab-4a24-b36d-6c93fb664d35_1600x2074.png" width="462" height="598.7596153846154" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/405f0267-4eab-4a24-b36d-6c93fb664d35_1600x2074.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1887,&quot;width&quot;:1456,&quot;resizeWidth&quot;:462,&quot;bytes&quot;:1059870,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://heroicpandasec.substack.com/i/163812855?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F405f0267-4eab-4a24-b36d-6c93fb664d35_1600x2074.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!7o9L!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F405f0267-4eab-4a24-b36d-6c93fb664d35_1600x2074.png 424w, https://substackcdn.com/image/fetch/$s_!7o9L!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F405f0267-4eab-4a24-b36d-6c93fb664d35_1600x2074.png 848w, https://substackcdn.com/image/fetch/$s_!7o9L!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F405f0267-4eab-4a24-b36d-6c93fb664d35_1600x2074.png 1272w, https://substackcdn.com/image/fetch/$s_!7o9L!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F405f0267-4eab-4a24-b36d-6c93fb664d35_1600x2074.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>It&#8217;s pretty darn similar, right? </p><p>Though, rather than software dependencies alone, that red, towery-thing was designed as a depiction of heavy third-party involvement as &#8220;ever-present&#8221; across breaches in 2024.</p><p>According to the authors, the Verizon DBIR design team &#8220;rose to the challenge of representing the balancing act an organization&#8217;s security programs have to perform with the growing dependence on those third parties.&#8221; And</p><blockquote><p><strong>&#8220;If the impossibly balanced shape on the cover makes you uncomfortable, you have begun to understand the challenges modern Chief Information Security Officers (CISOs) face in the current environment</strong>.&#8221;</p></blockquote><p>That shout of &#8220;Amen!&#8221; you may have heard was voice of every security leader from here to Timbuktu cheering in unison.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-3" href="#footnote-3" target="_self">3</a></p><p>If you&#8217;re in security, name me one security program that doesn&#8217;t rely on:</p><ul><li><p>Third-party tooling</p></li><li><p>Open source software (maintained outside of the organization)</p></li><li><p>Third-party intelligence</p></li><li><p>Third-party software to business and/or product operations</p></li><li><p>Thoughts, prayers, and creative incantations, hoping that your organization isn&#8217;t the next target of some threat group&#8217;s ire</p></li></ul><p>Okay, so I&#8217;m kidding with that last one (sort of), but could you think of anything? I sure couldn&#8217;t. That&#8217;s because the reality is, whether by the natural state of things or by us all becoming victims of genius marketing tactics, that third-party tools make the security world go &#8216;round. Even if such tools aren&#8217;t owned by security, third-party tools are deployed across every business. </p><p>Each and every third-party connection or integration represents an extension of the <a href="https://www.ibm.com/think/topics/attack-surface#:~:text=An%20organization's%20attack%20surface%20is,to%20carry%20out%20a%20cyberattack.">attack surface</a> for a given organization. That&#8217;s just how the world works nowadays.</p><p>I applaud the design choices this year, but I do think that the Verizon DBIR team missed the mark in giving kudos to Randall Munroe.</p><h1>Howdy, pard&#8217;ner!</h1><p>One major thing that sets the DBIR apart from other reports in the security industry is the reliance on data sources from other reputable organizations aside from that of the publishing organization. Other companies do publish wonderful work, yet their work is usually catered towards their ideal customer profile and/or limited to only the data they have through their company or their product. While, yes, Verizon&#8217;s own data is included in the report, the DBIR relies heavily on outside contributors to provide information. </p><p>These datasets come from around the world, spanning several governmental agencies (<a href="https://www.secretservice.gov/">United States Secret Service</a>, <a href="https://cert.europa.eu/">CERT-EU</a>, <a href="https://www.ncsa.or.th/home">National Cybersecurity Agency-Thailand</a>) and a breadth of tech companies, including many recognizable names with massive global footprints (Okta, Zscaler, Akamai, Tenable, Qualys). This diversity of inputs allow Verizon to have an extremely rich set of data, providing for a unique glimpse into security attack trends around the world. </p><h1>A few general thoughts</h1><p>Before we dive into the waters that Verizon made warm for us, I wanted to share a few overall impressions of the DBIR as a whole.</p><h4>Personality, style, and overall fabulousness</h4><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!WHHN!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5369e294-aac4-4245-854b-9b3bb356631a_600x338.gif" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!WHHN!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5369e294-aac4-4245-854b-9b3bb356631a_600x338.gif 424w, https://substackcdn.com/image/fetch/$s_!WHHN!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5369e294-aac4-4245-854b-9b3bb356631a_600x338.gif 848w, https://substackcdn.com/image/fetch/$s_!WHHN!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5369e294-aac4-4245-854b-9b3bb356631a_600x338.gif 1272w, https://substackcdn.com/image/fetch/$s_!WHHN!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5369e294-aac4-4245-854b-9b3bb356631a_600x338.gif 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!WHHN!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5369e294-aac4-4245-854b-9b3bb356631a_600x338.gif" width="418" height="235.47333333333333" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5369e294-aac4-4245-854b-9b3bb356631a_600x338.gif&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:338,&quot;width&quot;:600,&quot;resizeWidth&quot;:418,&quot;bytes&quot;:2585769,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/gif&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://heroicpandasec.substack.com/i/163812855?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5369e294-aac4-4245-854b-9b3bb356631a_600x338.gif&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!WHHN!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5369e294-aac4-4245-854b-9b3bb356631a_600x338.gif 424w, https://substackcdn.com/image/fetch/$s_!WHHN!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5369e294-aac4-4245-854b-9b3bb356631a_600x338.gif 848w, https://substackcdn.com/image/fetch/$s_!WHHN!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5369e294-aac4-4245-854b-9b3bb356631a_600x338.gif 1272w, https://substackcdn.com/image/fetch/$s_!WHHN!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5369e294-aac4-4245-854b-9b3bb356631a_600x338.gif 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p>I LOVE the personality sprinkled throughout this report. The primary focus is on objective analytical insights, yes, yet the DBIR team finds room to pepper their personalities here, there, and everywhere while still giving us the statistics we crave. I love it. The incorporation of a more approachable writing style makes the report fun to read while still painting the picture of what the data was describing over the past year. Many of the headings are clever and the bulk of the paragraphs are a mixture of direct, objective writing and witty banter amongst nerdy colleagues.</p><p>There&#8217;s also clarity of tone across the document. I&#8217;m not sure if the DBIR team are all trained writers, or if their work was edited to be as clear as possible, but there&#8217;s no mistaking when the team is giving us a chuckle versus when they are telling us  something serious. I took this writing style as a major learning moment and something I&#8217;d love to emulate as I keep writing my own things. </p><h4>Footloose footnotes</h4><p>Footnotes are either something to be avoided or something to be looked at without actually reading&#8212;but, let&#8217;s face it, you saw the footnote and just <em>had</em> to take a glance, only to lose your place in the text, then you realize that you may not have been paying attention to what you&#8217;re reading for the past 5 pages or so (ADHD, anyone?). </p><p>I typically look forward to reading footnotes with about as much zeal as I give towards a 30-foot long Walgreens receipt. &#8220;Hold my beer,&#8221; says the Verizon DBIR team.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-4" href="#footnote-4" target="_self">4</a></p><p>Here&#8217;s an example of the playful footnotes they used to garnish their prose&#8212;even lacking context, the personality is plain to see:</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!pd01!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F80b4d499-3d3e-4449-be75-d0754298b2ba_1292x168.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!pd01!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F80b4d499-3d3e-4449-be75-d0754298b2ba_1292x168.png 424w, https://substackcdn.com/image/fetch/$s_!pd01!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F80b4d499-3d3e-4449-be75-d0754298b2ba_1292x168.png 848w, https://substackcdn.com/image/fetch/$s_!pd01!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F80b4d499-3d3e-4449-be75-d0754298b2ba_1292x168.png 1272w, https://substackcdn.com/image/fetch/$s_!pd01!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F80b4d499-3d3e-4449-be75-d0754298b2ba_1292x168.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!pd01!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F80b4d499-3d3e-4449-be75-d0754298b2ba_1292x168.png" width="1292" height="168" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/80b4d499-3d3e-4449-be75-d0754298b2ba_1292x168.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:168,&quot;width&quot;:1292,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:42210,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://heroicpandasec.substack.com/i/163812855?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F80b4d499-3d3e-4449-be75-d0754298b2ba_1292x168.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!pd01!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F80b4d499-3d3e-4449-be75-d0754298b2ba_1292x168.png 424w, https://substackcdn.com/image/fetch/$s_!pd01!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F80b4d499-3d3e-4449-be75-d0754298b2ba_1292x168.png 848w, https://substackcdn.com/image/fetch/$s_!pd01!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F80b4d499-3d3e-4449-be75-d0754298b2ba_1292x168.png 1272w, https://substackcdn.com/image/fetch/$s_!pd01!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F80b4d499-3d3e-4449-be75-d0754298b2ba_1292x168.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p>Some papers are written with the personality of a bloated whale carcass.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-5" href="#footnote-5" target="_self">5</a> The DBIR is a prime example of how you can incorporate a healthy helping of pizzazz while still saying important things effectively.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-6" href="#footnote-6" target="_self">6</a></p><h4>So many charts, so little time</h4><p>In past years, I&#8217;d be lying if I said that I did anything more than skim the DBIR for the cute little charts, maybe scooping up a headline or two along the way so I sound intelligent in some future conversation. The DBIR team goes out of their way to paint fashionable charts with lots of color, likely because, I&#8217;m assuming, most people are just like me and are scrolling through to see the pretty pictures. Behind every one of those &#8220;pretty pictures&#8221;, though, is troves of data and lots of analysis. </p><p>Having data alone is a great first step. Having data that is relevant and useful is a solid Step #2. Then, perhaps most important, is knowing <em>how</em> to relay that data to others in a way that both (1) accurately depicts the objective interpretations supported by the data itself, and (2) helps you achieve your aims. </p><p>If you want a super big, gold star for using data awesomely, then you&#8217;ll find ways to add pretty pictures into your PowerPoint slides. The Verizon DBIR gives us all a masterclass in how to do this through innovative data visualization. Watch and learn, folks!</p><div class="image-gallery-embed" data-attrs="{&quot;gallery&quot;:{&quot;images&quot;:[{&quot;type&quot;:&quot;image/png&quot;,&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/42fb75cd-aa61-44e4-bb17-e2b0ded7eb4c_1616x752.png&quot;},{&quot;type&quot;:&quot;image/png&quot;,&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/422d314f-2261-46c1-a375-e25d7e57a5fb_1578x1338.png&quot;},{&quot;type&quot;:&quot;image/png&quot;,&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3db41218-31ce-47be-9f5a-cca2775e90c6_1548x1234.png&quot;},{&quot;type&quot;:&quot;image/png&quot;,&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/1732e3de-7319-412f-a4ab-897cf6613cb7_2342x1268.png&quot;},{&quot;type&quot;:&quot;image/png&quot;,&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/acbd69af-655b-488d-b642-a588022b31cd_762x1778.png&quot;},{&quot;type&quot;:&quot;image/png&quot;,&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/93ae1a01-b6cc-4030-af1b-cd6516db3edf_778x1510.png&quot;},{&quot;type&quot;:&quot;image/png&quot;,&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d4c8c110-e1a6-4c3a-b431-299ac7c4f6c2_1534x1194.png&quot;},{&quot;type&quot;:&quot;image/png&quot;,&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/65c38452-6c33-4d39-bc00-baebe44c16d5_1538x1170.png&quot;}],&quot;caption&quot;:&quot;Example charts from the 2025 Verizon Data Breach Investigations Report&quot;,&quot;alt&quot;:&quot;&quot;,&quot;staticGalleryImage&quot;:{&quot;type&quot;:&quot;image/png&quot;,&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/63b136aa-8972-462c-98a4-fd0800ee3e2d_1456x1700.png&quot;}},&quot;isEditorNode&quot;:true}"></div><p>The bummer is that not all charts are created equally well. I was looking forward for the &#8220;Industry&#8221; breakdown section, where the team breaks apart the data set in accordance with the various industry verticals. Here, they produce these gigantic charts that, while interesting, are extremely difficult to read. In the example below, which takes up a full page in the report, notice how the x-axis is only listed at the bottom of the page, meaning that you have to perform Olympic levels of eyeball ping pong in order to see which column you&#8217;re looking at.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!7Rbp!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F04faa1a9-01dc-4729-afaf-2341b3d2faa2_1440x1758.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!7Rbp!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F04faa1a9-01dc-4729-afaf-2341b3d2faa2_1440x1758.png 424w, https://substackcdn.com/image/fetch/$s_!7Rbp!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F04faa1a9-01dc-4729-afaf-2341b3d2faa2_1440x1758.png 848w, https://substackcdn.com/image/fetch/$s_!7Rbp!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F04faa1a9-01dc-4729-afaf-2341b3d2faa2_1440x1758.png 1272w, https://substackcdn.com/image/fetch/$s_!7Rbp!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F04faa1a9-01dc-4729-afaf-2341b3d2faa2_1440x1758.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!7Rbp!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F04faa1a9-01dc-4729-afaf-2341b3d2faa2_1440x1758.png" width="642" height="783.775" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/04faa1a9-01dc-4729-afaf-2341b3d2faa2_1440x1758.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1758,&quot;width&quot;:1440,&quot;resizeWidth&quot;:642,&quot;bytes&quot;:1197836,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://heroicpandasec.substack.com/i/163812855?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F04faa1a9-01dc-4729-afaf-2341b3d2faa2_1440x1758.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!7Rbp!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F04faa1a9-01dc-4729-afaf-2341b3d2faa2_1440x1758.png 424w, https://substackcdn.com/image/fetch/$s_!7Rbp!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F04faa1a9-01dc-4729-afaf-2341b3d2faa2_1440x1758.png 848w, https://substackcdn.com/image/fetch/$s_!7Rbp!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F04faa1a9-01dc-4729-afaf-2341b3d2faa2_1440x1758.png 1272w, https://substackcdn.com/image/fetch/$s_!7Rbp!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F04faa1a9-01dc-4729-afaf-2341b3d2faa2_1440x1758.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>For my plebeian brain, this was disappointing. The heat mapping of totals and the level of detail is impressive, yet it&#8217;s a bit of an airball to me, like a jump shot that looks perfect as it leaves the player&#8217;s hand, even with a perfect trajectory through the air, only for the ball to just miss the rim entirely. The above is an example where perhaps <em>too</em> much thought produced an over-engineered chart which misses the mark.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-7" href="#footnote-7" target="_self">7</a></p><p>I do also like how they include the <em>n=123</em> (or whatever number) at the bottom of each and every graph, showing the size of the dataset used for that specific measurement. This is so helpful for readers as it prevents people from having to lookup numbers elsewhere, like in footnotes, allowing them to continue moving about the cabin as they read.</p><p>Still, even through my peckishness, I thoroughly enjoyed the visuals. Even if you don&#8217;t take the time to read the whole report, do yourself a favor and take a look at the stories as told through the charts alone.</p><h1>Ain&#8217;t no party like a third-party party, &#8216;Cause a third-party party don&#8217;t stop</h1><p>An example of this report&#8217;s fabulousness is the first image in the gallery above, shared at the beginning of the report itself, presented under the headline, &#8220;It&#8217;s third party, and we&#8217;ll breach if we want to&#8221;. The team took the word &#8220;party&#8221; and then used birthday cakes in the accompanying chart because everyone knows that you can&#8217;t have a party without a cake<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-8" href="#footnote-8" target="_self">8</a>. Fab-u-lous.</p><p>Unfortunately, less fabulous is the heavy increase in third-party involvement in this year&#8217;s data set. The DBIR states, &#8220;<strong>we found third-party involvement of some sort in 30% of all breaches we analyzed, up from roughly 15% last year</strong>&#8221;. That means that there was some form of third-party contribution to <em><a href="https://www.ncsc.gov.uk/guidance/data-breaches">data</a></em><a href="https://www.ncsc.gov.uk/guidance/data-breaches"> </a><em><a href="https://www.ncsc.gov.uk/guidance/data-breaches">breaches</a></em><a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-9" href="#footnote-9" target="_self">9</a><em><strong>, </strong></em>not just to more  incidents more broadly.</p><p>The birthday cake chart is just the first of a 1-2 combo as they then hit us with how 81% of third-party breach involvement involved vulnerability exploitation (System Intrusion). Companies of all sizes struggle with vulnerability management, so why should a company&#8217;s vendors be any different?</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!UBpX!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F76ddce7a-5fb5-4903-a86f-d1fc5cb7ff2a_662x902.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!UBpX!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F76ddce7a-5fb5-4903-a86f-d1fc5cb7ff2a_662x902.png 424w, https://substackcdn.com/image/fetch/$s_!UBpX!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F76ddce7a-5fb5-4903-a86f-d1fc5cb7ff2a_662x902.png 848w, https://substackcdn.com/image/fetch/$s_!UBpX!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F76ddce7a-5fb5-4903-a86f-d1fc5cb7ff2a_662x902.png 1272w, https://substackcdn.com/image/fetch/$s_!UBpX!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F76ddce7a-5fb5-4903-a86f-d1fc5cb7ff2a_662x902.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!UBpX!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F76ddce7a-5fb5-4903-a86f-d1fc5cb7ff2a_662x902.png" width="330" height="449.63746223564954" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/76ddce7a-5fb5-4903-a86f-d1fc5cb7ff2a_662x902.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:902,&quot;width&quot;:662,&quot;resizeWidth&quot;:330,&quot;bytes&quot;:104655,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://heroicpandasec.substack.com/i/163812855?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F76ddce7a-5fb5-4903-a86f-d1fc5cb7ff2a_662x902.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!UBpX!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F76ddce7a-5fb5-4903-a86f-d1fc5cb7ff2a_662x902.png 424w, https://substackcdn.com/image/fetch/$s_!UBpX!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F76ddce7a-5fb5-4903-a86f-d1fc5cb7ff2a_662x902.png 848w, https://substackcdn.com/image/fetch/$s_!UBpX!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F76ddce7a-5fb5-4903-a86f-d1fc5cb7ff2a_662x902.png 1272w, https://substackcdn.com/image/fetch/$s_!UBpX!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F76ddce7a-5fb5-4903-a86f-d1fc5cb7ff2a_662x902.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The difference is <strong>huge</strong>. When one company relies on another company as a vendor, particularly in B2B SaaS, there&#8217;s both contractual obligations and implicit trust. The contractual obligations part is literally what the vendor promises to deliver in a binding agreement, while the implicit trust occurs as no one is keeping tabs on all vulnerabilities for all of the vendors. The customer trusts that the vendor will do what&#8217;s needed in order to keep their house in order. </p><p>Vendor security assessments and vendor risk assessments are an impartial science at best. Even those companies with the strongest vendor security posture are susceptible to third-party events as soon as that first connection is made from between one product and another, or, as soon as they begin entering confidential data into that product.</p><p>Third-party software providers have to balance the need to expand their product and their customer base with an expanding landscape of vulnerabilities across their own third-party services and software dependencies. </p><p>If you are providing software to another company, you are responsible for identifying, tracking, prioritizing, and remediating vulnerabilities within your product. Period. As the Verizon DBIR states, &#8220;although there are a lot of mitigating controls and factors to help prevent a breach initiated by a software vulnerability from happening, <strong>the core issue&#8212;the vulnerability even existing&#8212;links back to the software vendors</strong>.&#8221;</p><p>Some of these third-party weaknesses could be easily solved through improved software development hygiene. <a href="https://www.cloudflare.com/learning/bots/what-is-credential-stuffing/">Credential reuse</a> is, sadly, a gray cloud that continues to hang over all companies, though it was shocking to see them say, &#8220;our research found <strong>the median time to remediate leaked secrets discovered in a GitHub repository was 94 days.</strong>&#8221;</p><blockquote><p><strong>The median time to remediate leaked secrets discovered in a GitHub repository was 94 days</strong><a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-10" href="#footnote-10" target="_self">10</a></p></blockquote><p><a href="https://en.wikipedia.org/wiki/Zero-day_vulnerability">Zero-day</a> vulnerabilities are one thing. Taking three months to pull published secrets from your repo? That&#8217;s another thing. </p><p>Want to be even more upset by that statistic they uncovered? Look at the chart of the dataset below.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!LIMi!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff462ed38-36a4-4511-914a-f991450b6d50_1318x652.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!LIMi!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff462ed38-36a4-4511-914a-f991450b6d50_1318x652.png 424w, https://substackcdn.com/image/fetch/$s_!LIMi!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff462ed38-36a4-4511-914a-f991450b6d50_1318x652.png 848w, https://substackcdn.com/image/fetch/$s_!LIMi!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff462ed38-36a4-4511-914a-f991450b6d50_1318x652.png 1272w, https://substackcdn.com/image/fetch/$s_!LIMi!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff462ed38-36a4-4511-914a-f991450b6d50_1318x652.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!LIMi!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff462ed38-36a4-4511-914a-f991450b6d50_1318x652.png" width="646" height="319.5690440060698" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f462ed38-36a4-4511-914a-f991450b6d50_1318x652.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:652,&quot;width&quot;:1318,&quot;resizeWidth&quot;:646,&quot;bytes&quot;:245155,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://heroicpandasec.substack.com/i/163812855?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff462ed38-36a4-4511-914a-f991450b6d50_1318x652.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!LIMi!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff462ed38-36a4-4511-914a-f991450b6d50_1318x652.png 424w, https://substackcdn.com/image/fetch/$s_!LIMi!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff462ed38-36a4-4511-914a-f991450b6d50_1318x652.png 848w, https://substackcdn.com/image/fetch/$s_!LIMi!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff462ed38-36a4-4511-914a-f991450b6d50_1318x652.png 1272w, https://substackcdn.com/image/fetch/$s_!LIMi!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff462ed38-36a4-4511-914a-f991450b6d50_1318x652.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>If you&#8217;re currently working as an engineer and you&#8217;re not shocked by the chart above, I don&#8217;t know what to tell you.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-11" href="#footnote-11" target="_self">11</a> I&#8217;m not sure about you, but an incident like what is shown above would be a big deal at any company that I&#8217;m familiar with and would likely be for yours, too. Third-party risks are finicky and pervasive enough without poor software development hygiene revealing preventable problems.</p><p>Third-party risk&#8212;<a href="https://youtu.be/APAlqOGG0Hw?si=cqtPchE5N6dI9-T1&amp;t=126">the gift that keeps on giving</a>!</p><h1>Your information classification destination</h1><p>One of the meatiest sections of the report is titled &#8220;Incident Classification Patterns&#8221;. Pages 37-65<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-12" href="#footnote-12" target="_self">12</a> categorize the incident data into generalized terms that are approachable to most. I recall a time where I didn&#8217;t know what these terms meant, so I&#8217;ve included links that hopefully help introduce the category to someone new to the field:</p><ul><li><p><a href="https://owasp.org/www-community/attacks/">Basic Web Application Attacks</a></p></li><li><p><a href="https://www.paloaltonetworks.com/cyberpedia/what-is-a-denial-of-service-attack-dos">Denial of Service</a></p></li><li><p><a href="https://www.securityweek.com/lost-and-stolen-devices-a-gateway-to-data-breaches-and-leaks/">Lost and Stolen Assets</a></p></li><li><p>Miscellaneous Errors (falls under insider threat<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-13" href="#footnote-13" target="_self">13</a>)</p><ul><li><p>I like Crowdstrike&#8217;s use of &#8220;<a href="https://www.crowdstrike.com/en-us/cybersecurity-101/identity-protection/insider-threat/#:~:text=or%20dwell%20undetected-,Negligent%20Insider%20Threats,-A%20negligent%20insider">Negligent insider threat</a>&#8221; for this one</p></li></ul></li><li><p><a href="https://www.cisa.gov/topics/physical-security/insider-threat-mitigation/defining-insider-threats#:~:text=Intentional%20Threats%C2%A0%2D%20The,advancing%20their%20careers.">Privilege Misuse</a> (<em>intentional</em> insider threat)</p></li><li><p><a href="https://www.cmu.edu/iso/aware/dont-take-the-bait/social-engineering.html">Social Engineering</a></p></li><li><p><a href="https://blog.barracuda.com/2023/10/20/system-intrusion-what-why-combat">System Intrusion</a></p><ul><li><p>Includes <a href="https://learn.microsoft.com/en-us/security/ransomware/human-operated-ransomware">ransomware</a> and <a href="https://en.wikipedia.org/wiki/Malware">malicious software/malware</a></p></li></ul></li><li><p>Everything Else<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-14" href="#footnote-14" target="_self">14</a></p><ul><li><p>This is a very small percentage of classified activity</p></li></ul></li></ul><p>&#8220;These incident patterns serve to cluster the similar incidents into categories that make them easier to understand and recall,&#8221; they say, and I agree. I think this categorization is helpful to readers.</p><p>Check out this chart where they depict all of the different categories, separating incidents from breaches, showing us which types of activity occur for each. Super cool.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Je3U!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F898a4c40-84fc-4f1f-9070-1b90b78095a3_2030x1070.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Je3U!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F898a4c40-84fc-4f1f-9070-1b90b78095a3_2030x1070.png 424w, https://substackcdn.com/image/fetch/$s_!Je3U!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F898a4c40-84fc-4f1f-9070-1b90b78095a3_2030x1070.png 848w, https://substackcdn.com/image/fetch/$s_!Je3U!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F898a4c40-84fc-4f1f-9070-1b90b78095a3_2030x1070.png 1272w, https://substackcdn.com/image/fetch/$s_!Je3U!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F898a4c40-84fc-4f1f-9070-1b90b78095a3_2030x1070.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Je3U!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F898a4c40-84fc-4f1f-9070-1b90b78095a3_2030x1070.png" width="728" height="383.5" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/898a4c40-84fc-4f1f-9070-1b90b78095a3_2030x1070.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:false,&quot;imageSize&quot;:&quot;normal&quot;,&quot;height&quot;:767,&quot;width&quot;:1456,&quot;resizeWidth&quot;:728,&quot;bytes&quot;:1314277,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://heroicpandasec.substack.com/i/163812855?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F898a4c40-84fc-4f1f-9070-1b90b78095a3_2030x1070.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:&quot;center&quot;,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Je3U!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F898a4c40-84fc-4f1f-9070-1b90b78095a3_2030x1070.png 424w, https://substackcdn.com/image/fetch/$s_!Je3U!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F898a4c40-84fc-4f1f-9070-1b90b78095a3_2030x1070.png 848w, https://substackcdn.com/image/fetch/$s_!Je3U!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F898a4c40-84fc-4f1f-9070-1b90b78095a3_2030x1070.png 1272w, https://substackcdn.com/image/fetch/$s_!Je3U!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F898a4c40-84fc-4f1f-9070-1b90b78095a3_2030x1070.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h4>Need a guide? This report shall provide</h4><p>Well, not <em>this </em>report. Not mine, but the cool Verizon one. You know what I mean.</p><p>The caboose attached to the end of each category is recommendations from the <a href="https://www.cisecurity.org/about-us">Center for Internet Security</a> (CIS). CIS flexes their technological muscle to create and share free resources like the <a href="https://www.cisecurity.org/controls">CIS Controls</a> and CIS <a href="https://www.cisecurity.org/cis-benchmarks">Benchmarks</a>, made available to all and references by most security tooling.</p><p>Here, the team lists CIS Controls that may help detection, mitigation, and/or remediation activities for that given genre of attack type. What a blessing! If a particular category catches the eye of the reader, then, poof! There are easily referenceable materials to help improve your company&#8217;s security posture in that area. </p><blockquote><p><strong>The inclusion of freely available, meaningful control suggestions makes this report immediately actionable. </strong></p></blockquote><p>You may look at the control listings in the report and think that some are pretty simple, if not obvious. Though, I have trouble recalling a time when the small things <em>weren&#8217;t</em> included in a breach report or root cause analysis. Often the obvious controls are the very routes that provide an inlet for initial access or a slew of other actions.</p><h4>System intrusion</h4><p>For &#8220;system intrusion&#8221;, they explain how it&#8217;s an intentionally broad category, saying, &#8220;System Intrusion encapsulates all the breaches and incidents that leverage a diversity of techniques, <strong>predominately hacking techniques and malware</strong>, with a dash of Social Engineering. Think of this pattern as the <strong>&#8216;hands on keyboard&#8217; type of attacker</strong>s, in which they&#8217;re using a combination of automation and craft to breach organizations&#8217; defenses and compromise their environment, <strong>largely with the purpose of deploying Ransomware, which accounts for 75% of breaches in this pattern.</strong>&#8221;<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-15" href="#footnote-15" target="_self">15</a></p><p>They make a point to highlight ransomware payments, which is particularly interesting given the addition of cyber insurance data into the dataset this year. Decreasing from last year, the &#8220;median ransom paid comes up as $115,000.&#8221; It&#8217;s funny how they choose the phrase &#8220;comes up&#8221; to showcase a metric that has objectively gone down, but who am I to judge?</p><p>The team takes care to mention <a href="https://www.akamai.com/glossary/what-is-magecart">Magecart</a> in this section, which is a piece of malware that vacuums up sensitive information, namely credit card information, from victim e-commerce sites. &#8220;They represent 1% of System Intrusion breaches and 80% of breaches involving payment cards.&#8221;</p><p>Wow. I&#8217;ll be honest, so much of my security life has revolved around attack vectors at the enterprise level that I often forget how prevalent cyber attacks are at the consumer level. The compromise of a single payment card for a single person <a href="https://www.cnbc.com/2024/09/12/why-credit-card-fraud-alerts-are-rising.html#:~:text=Global%20card%20losses%20attributed%20to%20fraud%20reached%20%2433%20billion%20in%202022%2C%20according%20to%20payments%20industry%20research%20company%20Nilson%20Report%2C%20with%20the%20U.S.%20market%20representing%20roughly%2040%25%20of%20losses.%20It%20has%20forecast%20a%20persistent%20threat%20that%20could%20reach%20nearly%20%24400%20billion%20in%20card%20fraud%20in%20the%20decade%20to%202032.">carries the potential for devastating consequences</a>, especially in the United States. Effective software like Magecart only makes easy targets even easier to victimize.</p><ul><li><p><strong>Guidance from the U.S. Consumer Financial Protection Bureau, <a href="https://www.consumerfinance.gov/ask-cfpb/what-do-i-do-if-i-think-i-have-been-a-victim-of-identity-theft-en-31/">&#8220;What do I do if I&#8217;ve been a victim of identity theft?&#8221;</a></strong></p></li></ul><h1>Trust, you must, even if I am sus</h1><p>-piciously, potentially, just maybe-ly not who I say I am.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-16" href="#footnote-16" target="_self">16</a></p><p>Social engineering gains prominence as the second category brought into the spotlight of the DBIR. And for good reason, as 85% of the 4,009 incidents<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-17" href="#footnote-17" target="_self">17</a> involving some form of social engineering resulted in a data breach. Think about an 85% success rate in any sport in the world: a batting average of .850, kicking the ball into the sports net 85% of the time, making 85% of your three-pointers in basketball, heck, even 85% of your free throws would be a huge deal. That&#8217;s an incredible statistic.</p><p>Stalwarts like phishing and <a href="https://blog.knowbe4.com/pretexting-defined">pretexting</a> take the cake, still (remember how we talked about the small, little things?). Criminals leverage these methods because they are incredibly effective. </p><p>Why would I spend my blood, sweat, and tears trying to gain entry from a technical standpoint when I can just give you quick call, send you phishing email, or hit you up on LinkedIn pretending to be someone I&#8217;m not? </p><p>For social engineering, I love Rachel Tobac&#8217;s work, insight, and approach in teaching others. Here&#8217;s an interesting <a href="https://www.hackerone.com/blog/hacker-qa-rachel-tobac-hacking-companies-through-their-people">Q&amp;A that she did with HackerOne</a>, with a million other bits of content involving her work elsewhere online. She&#8217;s great and you should follow and support her! Check out her company, <a href="https://www.socialproofsecurity.com/">SocialProof Security</a>. We need more empathic security professionals like Rachel on this Earth.</p><div><hr></div><p>Have you ever found yourself analyzing a report, then writing a report on that report you were analyzing, only to see that your report on the report is almost as long as the report itself? Well, that&#8217;s me. Right now. In this moment. Thank you for bearing with me thus far!</p><div class="captioned-button-wrap" data-attrs="{&quot;url&quot;:&quot;https://heroicpanda.com/p/the-2025-verizon-data-breach-investigations?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="CaptionedButtonToDOM"><div class="preamble"><p class="cta-caption">You&#8217;ve ventured this far, so why not bring others into the fellowship? Please share, if you&#8217;d like!</p></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://heroicpanda.com/p/the-2025-verizon-data-breach-investigations?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://heroicpanda.com/p/the-2025-verizon-data-breach-investigations?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p></div><div><hr></div><h1>Different attack patterns for different industries</h1><p>The second-meatiest section of the Verizon DBIR is that entitled &#8220;Industries&#8221;. Using the <a href="https://www.naics.com/search/">North American Industry Classification System</a> (NAICS), something I didn&#8217;t know existed until reading this<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-18" href="#footnote-18" target="_self">18</a>, the team separates the data into applicable chunks within each industry. They unpack a lot of information that I will <em>not</em> regurgitate here (fortunately for us all), so it&#8217;s worth a glance.</p><p>I found the introductory table fascinating in and of itself. You can see the separation of &#8220;incident&#8221; versus &#8220;breach&#8221;, business size, plus industry category.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!ewIT!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa98f888f-f73c-461c-8f07-d5ee4b770f58_1990x1248.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ewIT!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa98f888f-f73c-461c-8f07-d5ee4b770f58_1990x1248.png 424w, https://substackcdn.com/image/fetch/$s_!ewIT!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa98f888f-f73c-461c-8f07-d5ee4b770f58_1990x1248.png 848w, https://substackcdn.com/image/fetch/$s_!ewIT!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa98f888f-f73c-461c-8f07-d5ee4b770f58_1990x1248.png 1272w, https://substackcdn.com/image/fetch/$s_!ewIT!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa98f888f-f73c-461c-8f07-d5ee4b770f58_1990x1248.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ewIT!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa98f888f-f73c-461c-8f07-d5ee4b770f58_1990x1248.png" width="728" height="456.5" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a98f888f-f73c-461c-8f07-d5ee4b770f58_1990x1248.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:913,&quot;width&quot;:1456,&quot;resizeWidth&quot;:728,&quot;bytes&quot;:318844,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://heroicpandasec.substack.com/i/163812855?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa98f888f-f73c-461c-8f07-d5ee4b770f58_1990x1248.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!ewIT!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa98f888f-f73c-461c-8f07-d5ee4b770f58_1990x1248.png 424w, https://substackcdn.com/image/fetch/$s_!ewIT!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa98f888f-f73c-461c-8f07-d5ee4b770f58_1990x1248.png 848w, https://substackcdn.com/image/fetch/$s_!ewIT!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa98f888f-f73c-461c-8f07-d5ee4b770f58_1990x1248.png 1272w, https://substackcdn.com/image/fetch/$s_!ewIT!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa98f888f-f73c-461c-8f07-d5ee4b770f58_1990x1248.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>What I found myself doing for all of these stats is looking at the total number of incidents and then the total number of breaches for each respective point of focus. I&#8217;m struck by the efficacy of some incidents in regard to their ability to cause a material breach of data.</p><p>Look at Healthcare above. 1,542 out of 1,710 total incidents resulted in a breach. That&#8217;s an incredible success rate. Another, albeit smaller group, was Retail, with 439 breaches out of a total of 493 incidents. These are startling numbers. </p><p>Perhaps, like many of you, I have benefited from experience in more than one industry vertical. I found myself thinking back to the different companies I&#8217;ve worked for, thinking, &#8220;What would <em>{XYZ company}</em> have done?&#8221; as I read through each industry. </p><p>As I move on to my next point, please do not take my limited writings on the &#8220;Industries&#8221; section as a minimization of it&#8217;s importance. There&#8217;s another table on pp. 71-72 that spotlights actor motives, top attack patterns, and the types of data compromised.</p><h1>Empathy for all those in security</h1><p>Perhaps my most meaningful takeaway from this report, above all else, is how much more empathy and compassion I felt for my colleagues across various industries, namely those in the healthcare and education spaces.</p><p>Think about it: while healthcare rakes in an <a href="https://www.ama-assn.org/about/ama-research/trends-health-care-spending">insane amount of money each year</a>, I am not aware of any healthcare institution with cyber capabilities that rival other security-heavy industries, like international banks. Sure, some of the larger healthcare chains may have mature security departments, but how does that compare to smaller healthcare chains, single hospitals, or under-funded rural health providers? </p><p>If you&#8217;re a criminal that&#8217;s simply looking to make money, would you try to take down Goliath immediately, knowing the high amount of effort it may take, or would you strike at the target that&#8217;s less defended. <strong>It&#8217;s not rocket science</strong>. Threat actors will strike at whatever prey is available and the continued use of ransomware against healthcare providers is proof that many <a href="https://www.ibm.com/think/insights/when-ransomware-kills-attacks-on-healthcare-facilities#:~:text=health%20and%20safety.-,Ransomware%20in%20life%2Dand%2Ddeath%20situations,attacks%20on%20healthcare%20since%202015.">criminals do not care about the wellbeing of patients</a>.</p><p>Similarly, educational institutions are quite likely to be extremely budget conscious while <a href="https://www.schellman.com/blog/cybersecurity/cybersecurity-incidents-at-universities-2023">coming under increased fire from malicious actors</a>. Security teams at colleges and universities around the world, with but a few exceptions, do not have tons of cash at their disposal to spend in the event of a material incident, especially a breach. A disruptive cyber incident may result in an increased security budget in the end, but that&#8217;s not to say that budget increases alone are enough to curtail the threat, let alone ease the burden of stress on security practitioners.</p><p>I&#8217;m walking away from the 2025 Verizon DBIR with a heavy heart. Not a defeated heart, mind you, just an increased awareness that other cyber defenders are encountering perilous situations on a constant basis. In an industry like security where stress is an unwanted yet omnipresent benefit of the job, we should take care to reach out and make sure everyone is okay.</p><p></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://heroicpanda.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Security for the Rest of Us! Subscribe for free to receive new posts and support my work - Cheers.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p> </p><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-1" href="#footnote-anchor-1" class="footnote-number" contenteditable="false" target="_self">1</a><div class="footnote-content"><p>Crap&#8212;I just dated myself, didn&#8217;t I.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-2" href="#footnote-anchor-2" class="footnote-number" contenteditable="false" target="_self">2</a><div class="footnote-content"><p>Before you ask, yes, I did Google it first. And, yes, I did ask ChatGPT, which said, &#8220;While Fred R. Barnard popularized it in advertising, Arthur Brisbane may have been the first to express the idea in words. There is no confirmed ancient origin&#8212;<strong>especially not in Chinese literature</strong>.&#8221; Um&#8230;what?</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-3" href="#footnote-anchor-3" class="footnote-number" contenteditable="false" target="_self">3</a><div class="footnote-content"><p>In full transparency, I have no clue what CISOs are saying in the Republic of Mali.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-4" href="#footnote-anchor-4" class="footnote-number" contenteditable="false" target="_self">4</a><div class="footnote-content"><p>Not really, though I like to imagine that they&#8217;d tell me this over beers if we were actually having beers because they seem pretty cool.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-5" href="#footnote-anchor-5" class="footnote-number" contenteditable="false" target="_self">5</a><div class="footnote-content"><p>&#8230;you&#8217;re not thinking of me when you read that, right? RIGHT?!</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-6" href="#footnote-anchor-6" class="footnote-number" contenteditable="false" target="_self">6</a><div class="footnote-content"><p>Please excuse me as I experiment with footnotes for the first time. Thank you for your understanding.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-7" href="#footnote-anchor-7" class="footnote-number" contenteditable="false" target="_self">7</a><div class="footnote-content"><p>Don&#8217;t take my word for it, though! Check it out yourself on p. 69</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-8" href="#footnote-anchor-8" class="footnote-number" contenteditable="false" target="_self">8</a><div class="footnote-content"><p>Says the guy who does <em>not</em> attend fancy parties which may or may not involve cake. Also, great. Now I&#8217;m hungry for cake.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-9" href="#footnote-anchor-9" class="footnote-number" contenteditable="false" target="_self">9</a><div class="footnote-content"><p>Excellent resource for the general public on data breaches, plus how you can take action if you&#8217;re impacted as a consumer.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-10" href="#footnote-anchor-10" class="footnote-number" contenteditable="false" target="_self">10</a><div class="footnote-content"><p>&#8220;I&#8217;ll take a giant &#8216;WTF&#8217; for $1,000, please, Alex.&#8221;</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-11" href="#footnote-anchor-11" class="footnote-number" contenteditable="false" target="_self">11</a><div class="footnote-content"><p>Actually, I do, but my Mom said, &#8220;If you don&#8217;t have anything nice to say&#8230;&#8221;</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-12" href="#footnote-anchor-12" class="footnote-number" contenteditable="false" target="_self">12</a><div class="footnote-content"><p>Does the citing of specific pages help make me sound intelligent? Asking for a friend.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-13" href="#footnote-anchor-13" class="footnote-number" contenteditable="false" target="_self">13</a><div class="footnote-content"><p>Excluding intentional or malicious actions taken by an insider, since the Verizon DBIR puts that into another classification, Privilege Misuse.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-14" href="#footnote-anchor-14" class="footnote-number" contenteditable="false" target="_self">14</a><div class="footnote-content"><p>When reading this, no kidding, I thought of Panera&#8217;s <a href="https://www.panerabread.com/en-us/menu/products/kitchen-sink-cookie.html">kitchen sink cookie</a>. </p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-15" href="#footnote-anchor-15" class="footnote-number" contenteditable="false" target="_self">15</a><div class="footnote-content"><p>Yes, I just quoted almost an entire paragraph. And, yes, I have no idea what I&#8217;m doing.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-16" href="#footnote-anchor-16" class="footnote-number" contenteditable="false" target="_self">16</a><div class="footnote-content"><p>I hyphenated a heading into the next line. Can I do that? Did it work? If not, don&#8217;t tell me. Just let me continue believing I am clever.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-17" href="#footnote-anchor-17" class="footnote-number" contenteditable="false" target="_self">17</a><div class="footnote-content"><p>I did math voluntarily. This is going down as a big deal in my diary today.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-18" href="#footnote-anchor-18" class="footnote-number" contenteditable="false" target="_self">18</a><div class="footnote-content"><p>Crap, I thought I knew everything&#8230;</p></div></div>]]></content:encoded></item><item><title><![CDATA[My Takeaways from RSAC Conference 2025]]></title><description><![CDATA[Learnings, happenings, and goings-on of RSAC Conference 2025]]></description><link>https://heroicpanda.com/p/my-takeaways-from-rsac-conference</link><guid isPermaLink="false">https://heroicpanda.com/p/my-takeaways-from-rsac-conference</guid><dc:creator><![CDATA[Nathan Walker]]></dc:creator><pubDate>Tue, 06 May 2025 17:35:04 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!YNUo!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7d241c1b-3b41-4b60-871c-30e784d4ec7f_2240x1260.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!YNUo!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7d241c1b-3b41-4b60-871c-30e784d4ec7f_2240x1260.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!YNUo!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7d241c1b-3b41-4b60-871c-30e784d4ec7f_2240x1260.png 424w, https://substackcdn.com/image/fetch/$s_!YNUo!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7d241c1b-3b41-4b60-871c-30e784d4ec7f_2240x1260.png 848w, https://substackcdn.com/image/fetch/$s_!YNUo!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7d241c1b-3b41-4b60-871c-30e784d4ec7f_2240x1260.png 1272w, https://substackcdn.com/image/fetch/$s_!YNUo!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7d241c1b-3b41-4b60-871c-30e784d4ec7f_2240x1260.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!YNUo!,w_2400,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7d241c1b-3b41-4b60-871c-30e784d4ec7f_2240x1260.png" width="1200" height="675" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/7d241c1b-3b41-4b60-871c-30e784d4ec7f_2240x1260.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:false,&quot;imageSize&quot;:&quot;large&quot;,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:1200,&quot;bytes&quot;:254358,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://heroicpandasec.substack.com/i/162833274?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7d241c1b-3b41-4b60-871c-30e784d4ec7f_2240x1260.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:&quot;center&quot;,&quot;offset&quot;:false}" class="sizing-large" alt="" srcset="https://substackcdn.com/image/fetch/$s_!YNUo!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7d241c1b-3b41-4b60-871c-30e784d4ec7f_2240x1260.png 424w, https://substackcdn.com/image/fetch/$s_!YNUo!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7d241c1b-3b41-4b60-871c-30e784d4ec7f_2240x1260.png 848w, https://substackcdn.com/image/fetch/$s_!YNUo!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7d241c1b-3b41-4b60-871c-30e784d4ec7f_2240x1260.png 1272w, https://substackcdn.com/image/fetch/$s_!YNUo!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7d241c1b-3b41-4b60-871c-30e784d4ec7f_2240x1260.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>40,000. What does that number mean to you?</p><p>Numbers are thrown at us from all directions, every day, whether we like it or not. They&#8217;re a constant presence in our lives, our actions, and our thoughts. So what comes to mind when you think about numbers? Maybe it&#8217;s the cost of something you saw in an ad, reading the time, trying to pretend you actually brush your teeth for two minutes every time, or maybe numbers are that series of digits on your weight scale that seem to creep higher and higher each time (is it just me?). Numbers are unavoidable. Numbers have meaning. Numbers have power.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://heroicpanda.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Security for the Rest of Us! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>Now, what about that 40,000&#8212;Did anything come to mind?</p><p>Maybe you thought about money, thinking about how $40,000 is just shy of the <a href="https://www.nea.org/resource-library/educator-pay-and-student-spending-how-does-your-state-rank">average starting salary of teachers</a> in the United States. Maybe <a href="https://en.wikipedia.org/wiki/40,000">Wikipedia&#8217;s  definition</a> of the number 40,000 came to mind, which is, literally, I&#8217;m not kidding, the &#8220;number that comes after 39,999 and before 40,001&#8221;. Maybe you recalled that 40,000 is the <a href="https://en.wikipedia.org/wiki/McDonald%27s">number of McDonald&#8217;s franchises</a> around the world. Or, maybe you thought about the 40,000 calories eaten by one man in order to experience what a tiger shark&#8217;s diet is like (<a href="https://www.instagram.com/reel/C_0dsPchaUH/">this is real</a>).</p><p>Regardless of what may have come to mind, 40,000 means something specific when it comes to RSAC Conference. Here, 40,000 refers to people. 40,000+ human people descending upon one city and one conference, all for one purpose&#8212;cybersecurity.</p><p>I, as a human person, was one of those human people. </p><p>Let&#8217;s jump into what RSAC had to offer this year, as well as my take on what topics were top of mind, as well as my experiences on the vendor floor.</p><div><hr></div><h1>40,000+ people is a lot of people</h1><p>40,000&#8212;That&#8217;s over twice the capacity of the Chase Center (where the Golden State Warriors play) and almost 2/3rds the capacity of Levi&#8217;s Stadium, where the 49ers do their sports-thing. 40,000 people is a heck of a lot of people.</p><p>In the context of <a href="https://www.rsaconference.com/library/blog/day-4-recap-2025">RSAC Conference</a>, that means that 40,000+ cybersecurity professionals gathering together to listen to talks and gain industry know-how. RSAC Conference attendees range from the unemployed and the entry-level all the way up to corporate executives and government officials from around the world. In 2025, RSAC boasted 730 speakers across 450 different sessions, along with a maze of vendors. 650 vendors, to be exact. </p><p>To be fair, the real number of attendees this year is actually <a href="https://www.rsaconference.com/library/press-release/2025-closing-release">around 43,500</a>, but once I found that story about a man eating 40,000 calories, I just had to keep it at 40,000 for coolness reasons.</p><blockquote><p><em><strong>NOTE: </strong></em>If &#8220;RSAC Conference&#8221; seems potentially redundant, it&#8217;s not; it&#8217;s actually on purpose. RSAC went through a formal rebranding in 2025, updating their name to &#8220;<em><strong>RSA<a href="https://www.onersac.com/">C</a></strong></em> Conference&#8221; from the previous &#8220;RSA Conference&#8221;. This updated naming also helps to distinguish between RSAC and <a href="https://www.rsa.com/">RSA Security</a>, a separate entity.</p></blockquote><p>Those 43,500+ attendees get funnelled into San Francisco&#8217;s <a href="https://www.xplorit.com/san-francisco">Moscone Center</a>, an enormous complex of what is three separate buildings, Moscone North, Moscone South, and Moscone West. In 2025, RSAC added a fourth location into the mix, the <a href="https://ybca.org/venues/">YBCA</a> (Yerba Buena Center for the Arts). This gave RSAC a nice, second stage for keynotes so they can hold large talks in two locations.</p><div><hr></div><h1>2025 Areas of Focus</h1><h2>Artificial intelligence AI-n&#8217;t going anywhere</h2><p>&#8220;Old McDonald had a farm - AI, AI-Oh!&#8221;</p><p>The consistently hot theme across 2023 and 2024 was AI and, drum roll, it&#8217;s <em>still</em> AI. AI is everywhere and that was definitely the case at RSAC. The San Franciscan air itself hung thick with AI. A million different ads across buses, bus stops, windows, walls, and airports clamored for attention, all shouting about some kind of AI capability.</p><p>Of course, &#8220;AI&#8221; is a really broad term, isn&#8217;t it? I mean, at least it is to me, where I&#8217;m at like Level 2 out of 100 when it comes to deep knowledge of artificial intelligence systems (and I don&#8217;t think I&#8217;m alone). &#8220;AI&#8221; can refer to any manner of artificial intelligence and is unhelpfully non-specific. Most of the material that I experienced was approachable and not very technical, but keep in mind that there were many, many talks covering this topic. The subgenre of &#8220;Artificial intelligence/Machine learning&#8221; included 130 sessions.</p><p>Dozens and dozens of talks this year fell under some kind of AI-related theme, indicating that there is both heavy interest and heavy concern about the how to secure this sprawling AI landscape. </p><blockquote><p><strong>As business leaders and teams buy more and more AI products, do security teams know all of the risks involved?</strong> </p><p><strong>Do teams know how to secure these AI systems or implement governance mechanisms that help ensure proper use?</strong></p></blockquote><p>For AI, RSAC sessions covered such topics as:</p><ul><li><p>AI tools are introducing new attack vectors</p><ul><li><p>Tools, like code copilots, introduce novel attack vectors</p></li><li><p>Since most organizations are not building their own LLMs, are they aware of how LLMs themselves can be weaponized or poisoned? </p></li></ul></li><li><p>Managing risk as AI proliferation continues</p></li><li><p>Unrestricted models like FraudGPT and WormGPT are enabling less technical threat actors </p><ul><li><p>Minimal intelligence + simple prompts can equal exploit code they wouldn&#8217;t have the know-how to produce</p></li></ul></li><li><p>Governance concerns</p><ul><li><p>Your company has AI tools deployed, but do you have governance mechanisms in place? Do you have applicable policies in place, let alone enforceable policies?</p></li></ul></li></ul><p>What I found validating was that other security professionals are very concerned about AI systems in general; how do we keep our companies, our colleagues, and ourselves secure?</p><h2>Geopolitical &amp; regulatory impacts</h2><p>It&#8217;s no secret that companies must conduct business in accordance with laws and regulations (duh, I know), but how do companies translate such legalese into actionable guidelines? Laws like <a href="https://gdpr.eu/what-is-gdpr/">GDPR</a> outline what must be in place, but it doesn&#8217;t detail <em>how</em> companies reach compliance. That is up to individual companies to implement or not implement. With <a href="https://www.enforcementtracker.com/">non-compliance penalties</a> that force companies to pony up real-world dollars, security and security-adjacent functions are often on the hook.</p><p>There are always talks about the intersection of international law and security. I found it interesting that the fallout of the <a href="https://www.npr.org/2021/04/16/985439655/a-worst-nightmare-cyberattack-the-untold-story-of-the-solarwinds-hack">2020 Solarwinds attack</a> is still top-of-mind enough to warrant discussion in 2025, focusing on the <a href="https://cyberscoop.com/tim-brown-solarwinds-liability-cyberlawcon/">litigation against Tim Brown</a>, the Solarwinds CISO, that resulted from federal investigations. Perhaps this is because CISOs continue to face uncertainty about whether or not they may be held personally liable in the aftermath of a major compromise. For CISOs, the worry alone has to be a tremendous burden to bear.</p><p>It&#8217;s also no secret that <a href="https://www.cisa.gov/topics/cyber-threats-and-advisories/nation-state-cyber-actors">nation states</a> engage in unrelenting digital reconnaissance and espionage, constantly seeking an edge over friends and foes alike. I have loved the talks given by <a href="https://www.rsaconference.com/experts/kevin-mandia">Kevin Mandia</a>, a man who is quite literally in the room after major incidents occur, as he has a unique view into the global threat landscape.</p><p>His keynote this year, <em>Cybersecurity Year-in-Review and the Future Ahead</em>, paid particularly attention to China&#8217;s state-sponsored threat actors. I found myself shocked at how directly he mentioned China and its ongoing support of cyber efforts directed against the United States. Various reconnaissance and malware campaigns have long been <a href="https://cloud.google.com/security/resources/insights/apt-groups">attributed to Chinese-backed APTs</a>, yet Mr. Mandia&#8217;s callouts this year had an urgency to them&#8212;at least from a U.S. perspective, China has gained footholds across the country, especially within critical infrastructure. Sometimes the motive for infiltration and lateral movement throughout victim organizations is unclear, which is troubling. This year, Kevin also sat down with Nicole Perlroth to have a conversation that is worth the watch (look for it to be released on YouTube this summer!).</p><p>One session carried an interesting title, asking, &#8220;Autocracy or Democracy: Which is Better at AI?&#8221; While I did see this session, I found the title itself rather profound. I don&#8217;t think I usually consider different systems of government in regard to artificial intelligence development. I think it&#8217;s a fabulous question that is worth pondering.</p><ul><li><p>What do you think? </p><ul><li><p>How might any given system of government better enable technological development?</p></li></ul></li></ul><p>In the days following RSAC I&#8217;ll be watching more of these sessions as I try to learn more about the regulatory and geopolitical realms of cybersecurity.</p><h2>Supply chain pains</h2><p>There were 37 talks this year under the subcategory of &#8220;Supply Chain&#8221;. Supply chain concerns are nothing new to security practitioners, especially with the wildfire of AI tooling that never seems to stop spreading. Supply chain worries are varied and the RSAC sessions reflected this, with topics ranging from firmware, to AI/LLMs, to potential issues with SOC 2 reports.</p><p>You can&#8217;t run a company today without some kind of third-party supplier, software, or hardware, but the incorporation of third-party technologies is the incorporation of risks outside of your control. For tech companies, the inclusion of third-party code into a codebase is something that should be of paramount concern. Talks this year seemed focused on helping others identify and wrangle the myriad of supply chain troubles that plague security teams.</p><p>I&#8217;m not surprised that supply chains didn&#8217;t get as much attention as AI, yet I&#8217;m encouraged in seeing that it&#8217;s still a high priority for many professionals.</p><h2>North Korean employee fraud</h2><p>Last year, security training company KnowBe4 shocked the world by announcing that they had duped into <a href="https://blog.knowbe4.com/how-a-north-korean-fake-it-worker-tried-to-infiltrate-us">hiring a North Korean software engineer</a>. Being alive in the late 20th to early 21st century means that you&#8217;re likely aware of North Korea&#8217;s cleverness when it comes to perpetrating fraud and criminal activity. The ever-connected, online world has opened the door for them to steal and launder funds in order to finance their <a href="https://www.dfat.gov.au/geo/democratic-peoples-republic-of-korea/democratic-peoples-republic-of-korea-north-korea-country-brief#:~:text=The%20Democratic%20People's%20Republic%20of,weapons%20and%20ballistic%20missile%20programs.">totalitarian state</a>. The BBC produced a brilliant podcast about this called the <a href="https://www.bbc.co.uk/programmes/w13xtvg9/episodes/downloads">Lazarus Heist</a>, exploring illicit North Korean cyber activity. </p><p>According to the Google Threat Intelligence Group, KnowBe4 is most certainly not the only victim. North Korea has weaponized remote work and remote hiring practices to <a href="https://cloud.google.com/blog/topics/threat-intelligence/dprk-it-workers-expanding-scope-scale">trick legitimate companies into hiring North Korean employees</a>.  Fake personas and paid middlemen around the world work with the North Korean government to get their workers hired, usually in some form of IT or software engineering capacity. Once hired, these North Korean employees can whatever access is at their disposal to harvest intellectual property, maintain internal visibility within possible future targets, and plant footholds into system for future weaponization or data exfiltration.</p><p>I heard this situation mentioned multiple times across RSAC and I feel that the emphasis is warranted. </p><p>How can your company best verify potential hires without being discriminatory? What technical and non-technical controls are in place to monitor systems activity and, hopefully, alert to potential malcompliance?</p><p>This presents a unique opening for security teams to work with their HR partners to learn about what measures are in place, what measures should be in place, and how such efforts can scale.</p><div><hr></div><h1>Vendor Trends</h1><div id="youtube2--P-ein58laA" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;-P-ein58laA&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/-P-ein58laA?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><p>If you want to know what companies want you to know about their products, I&#8217;ll give you a hint: it&#8217;s two letters, starts with an &#8220;A&#8221; and ends in an &#8220;I&#8221;. Yup. AI continues to reign supreme. The video above is fair representation of my my experience on the vendor floor. If I had played a drinking game where I take a sip each time I saw &#8220;AI&#8221; then I wouldn&#8217;t have made it 5-1/2 feet before passing out.</p><p>Those that attended last year&#8217;s RSAC may have felt as if they, too, were drowning in references to &#8220;AI&#8221; but I&#8217;d have to say that companies outdid themselves this year with even <em>more</em> AI speak than before. Words like &#8220;generative&#8221;, &#8220;agentic&#8221;, and &#8220;LLMs&#8221; hung in the air like a strong perfume. You couldn&#8217;t shake it. You couldn&#8217;t even make eye contact with a vendor without them tossing out some sort of spiel about their native artificial intelligence capabilities.</p><p>The end result of this AI-centered chaos is rather disappointing.</p><p>Think about a time when you were at a bar or a restaurant that had loud music playing, or maybe where conversations were loud and energized, making it hard to hear. Were you able to easily talk to the person next to you? Could you hear what you wanted to hear? Do you find yourself wishing for a different environment where you could engage more thoughtfully with those around you?</p><p>For me, the end result was <strong>noise</strong>. Lots and lots of noise. </p><blockquote><p><strong>There are so many companies singing the same song that it&#8217;s impossible to filter through to what&#8217;s most meaningful&#8212;whether or not a company has a novel approach that solves a problem I/my team/my company is facing.</strong></p></blockquote><p>There are security companies at RSAC that are tackling security problems well. The bummer is that the overly aggressive messaging around AI is starting to get tiring as everyone still seems to be riding the tidal wave of generate AI popularity that shook the Earth in 2023. </p><p>The challenge for companies in 2025 is nothing new. Companies need to find out how to rise above the noise to shine a light on the solutions offered within their product. </p><h2>Pushy salesmanship</h2><p>If you know me at all, you may not be surprised to know that I find it hard to turn down a good chance at small talk. If I see you, I want to smile and nod. If I talk to you, I want to ask you how you&#8217;re doing and have a chat. If someone at a vendor booth offers me something, I usually take it. My personality makes me ripe for the picking out on the vendor floor. I feel like a gazelle surrounded by lions.</p><p>I try to jump onto the vendor floor with a purpose. I swear, I really try. While my main interest is the sessions and talks themselves, I have to admit that the vendor floor is a cool place to see. I&#8217;ll bop over to the vendor area during lunch or as soon as the vendors are open at the end of the first day (after the keynotes). </p><p>Walking around the booths reminds me of how I felt when walking around Toys &#8216;R Us in the 1990s (RIP, Toys &#8216;R Us). I&#8217;m walking slowly, head tilted up, likely mouth-breathing without meaning to, staring in awe at all of the lights, sounds, and gizmos around me. However, unlike my younger self who just liked shiny things, at RSAC I&#8217;m walking around because I genuinely want to find companies and/or products that stick out, that warrant attention. Not because they have the brightest lights but because their solution is worth the time.</p><p>There were several times where I was walking around, gawking at the sights and sounds around me, only to be pulled aside by a vendor that I didn&#8217;t really want to talk to. </p><p>Don&#8217;t get me wrong, I understand that salespeople and customer-facing engineers fill these booths and are expected to lure people like myself in to gather marketing leads and potential prospects. They have a job to do. I get it. My issue isn&#8217;t with them doing their job, my issue lies with <em>how</em> they go about doing it. </p><h2>General reflections on vendor experience</h2><p>Here are a thoughts from my experience with vendors this year:</p><ol><li><p> <strong>I felt caught in the dragnet (sometimes)</strong></p><p>No, not the <a href="https://www.youtube.com/watch?v=0LBHl7gH_Rc">cop show from the &#8216;60s</a>. By dragnet, I mean the manner of fishing which pulls in a large amount of the target catch along with other unintended victims. These victims are usually other wildlife and/or vegetation that simply become collateral damage. This happens because of the chosen method, not because of fishing itself. The vendors that take on this approach just want to lure people in, potentially with some super sweet swag (under the <a href="https://news.wpcarey.asu.edu/20061206-gentle-science-persuasion-part-two-reciprocity">reciprocity</a> rule of persuasion psychology, perhaps), solely to meet lead quotas. I can&#8217;t tell you how many times I was scanned, only to see that the booth added no notes to my lead information. The few vendors that <em>didn&#8217;t</em> take this approach were thoughtful and used any questions to better guide the chat and demo, at least promising to continue the conversation using context I&#8217;d already shared. Pardon me as now I look around for verbal self-defense courses... This experience is nothing unique to RSAC, mind you, as this has been my experience elsewhere, too.</p></li><li><p><strong>Everything, everywhere, all at once</strong></p><p>That&#8217;s what the booths felt like&#8212;there was so much going on; everything, everywhere, all at once. Blinky lights, full-size monster trucks, 20-foot tall action figures, conversations, laughter, and oh so much noise. I was fine, but <strong>it was all overwhelming</strong>. I found comfort in the booths that didn&#8217;t have amplification or crowding due to booth attractiveness alone. For example, Wiz always has killer booth designs, yet, while there, I was bumping into more people looking at the booth itself than people who were genuinely learning about the product. Crowdstrike is a partial exception for me, here. Yes, their booth was insane this year. However, they seem to always hold their in-person talks at the backside of their booths, away from the other lines and demos. In general, though, the over-ornamentation feels cheap. I think that companies can still have large, attractive booths without overdoing it.</p></li><li><p><strong>Will people remember your booth or will they remember your product?</strong></p><p>Yes, expensive booth investments may garner more leads which may lead to more sales. Yes, branding is a critical part of any business, most especially tech startups. But, unless you&#8217;re a large, established org (insert any big security company name here), it appears as if there&#8217;s a heavier focus on the brand itself rather than on product quality. If I leave your booth more in awe of the booth than the product that was described/shown, then where&#8217;s the return in the long run? </p></li><li><p><strong>I appreciated the catch-and-release companies</strong></p><p>Some companies caught my eye due to booth awesomeness alone. Some companies were ones that I was seeking out intentionally. And some companies caught me off guard by reading my name tag, saying my first name, and making enough eye contact while greeting me that I felt too much pressure to <em>not</em> engage. For those companies where I wasn&#8217;t interested in the product but were effective at snagging us security pros as we drifted downstream, I appreciated them for releasing me back into the water. After a brief chat and some back and forth, it&#8217;s easy to see whether or not your product is a fit for my use cases. Or, maybe I outright say that I&#8217;m not interested. Just because someone is talented at reeling you into a booth doesn&#8217;t mean that you have to feign interest in return. </p></li></ol><p>Companies have an incredible opportunity to invest in their sales and marketing strategy. While everyone else is adding more blinky-blinkies and trinkets, you should start with the people on the ground, brainstorming, trialing, and standardizing more effective in-person demonstrations. </p><p>Whenever someone new enters a booth, whether warm (where someone approaches the booth) or cold (where a booth rep pulls someone in), booth workers have a chance to set the stage for the conversation. The visitor may have preconceived notions of your company or they may not know your company at all. Regardless of what they know or don&#8217;t know, that first interaction that they have with your booth should immediately have them feeling welcomed and listened to. Don&#8217;t scan them right away. Make an effort to create a comfortable space between them and your company. If they&#8217;re comfortable, they&#8217;ll be honest with you, and maybe that honesty is a &#8220;No thanks, I&#8217;m not interested.&#8221; Great! That&#8217;s fine. The point is that you&#8217;re setting the stage for success on both sides by <em>allowing</em> them room to be honest. </p><div class="pullquote"><p>If your company can reel someone in with a genuine affect <em><strong>and</strong></em> have a strong product to demo, where staffers believe in the solution, that&#8217;s where magic happens. </p><p>A company like that is going to win.</p></div><p>Focus on that first impression and then have the meaningful solution to keep the conversation going. </p><p>Negative first impressions are hard to shake, but strong first impressions are just as sticky.</p><div><hr></div><h1>Conclusion</h1><p>Alright, so this post is already much longer than I had planned (and by &#8220;planned&#8221;, I mean that loose outline that I was forming while writing this). Let&#8217;s wrap this up!</p><p>I&#8217;ve been fortunate to attend RSAC Conference for the past two years and have really enjoyed the conference. I may have had a lot of feels about my vendor experience this year, but all in all the experience is strongly enjoyable and one that I&#8217;ve found fruitful. </p><p>With perhaps one or two exceptions, everyone I bumped into at RSAC Conference was willing to have a chat. Every speaker session or panel I attended had the speakers ready and willing to take conversations outside afterward. They are always willing to talk shop, answer additional questions, or offer to connect beyond the conference. Just like a kid who is looking for role models, I&#8217;m always on the hunt for security professionals that I can look up to. RSAC Conference gives me the chance to meet my heros in the industry and identify new ones.</p><p>There&#8217;s an energy that hangs in the air for the two years that I&#8217;ve attended. From the expo floor to talks large and small, the overall atmosphere is one of comradery. I guess that an electricity forms when people are united by a common interest and a common cause, charging conversations and opening folks up to new acquaintances and opportunities.</p><p>I attend conferences because there&#8217;s a motivating humility that comes from being so close to others who have profound levels of expertise and knowledge. I always leave with new ideas, new things to bug my boss about, new concepts, and a refreshed feeling of purpose.</p><p>If you&#8217;re considering attending, then let me help you&#8212;you should! I&#8217;ve gained a great deal from my first two experiences at this conference and will be looking forward to many more.</p><p></p><p> </p><p></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://heroicpanda.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Security for the Rest of Us! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[What is Security Engineering?]]></title><description><![CDATA[Exploring the role, responsibilities, and impact]]></description><link>https://heroicpanda.com/p/what-is-security-engineering</link><guid isPermaLink="false">https://heroicpanda.com/p/what-is-security-engineering</guid><dc:creator><![CDATA[Nathan Walker]]></dc:creator><pubDate>Sat, 19 Apr 2025 20:49:48 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!ipmU!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa220ebf6-424f-4e36-8aa1-ff47b461fc54_1200x600.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!ipmU!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa220ebf6-424f-4e36-8aa1-ff47b461fc54_1200x600.png" data-component-name="Image2ToDOM"><div class="image2-inset image2-full-screen"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ipmU!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa220ebf6-424f-4e36-8aa1-ff47b461fc54_1200x600.png 424w, https://substackcdn.com/image/fetch/$s_!ipmU!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa220ebf6-424f-4e36-8aa1-ff47b461fc54_1200x600.png 848w, https://substackcdn.com/image/fetch/$s_!ipmU!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa220ebf6-424f-4e36-8aa1-ff47b461fc54_1200x600.png 1272w, https://substackcdn.com/image/fetch/$s_!ipmU!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa220ebf6-424f-4e36-8aa1-ff47b461fc54_1200x600.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ipmU!,w_5760,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa220ebf6-424f-4e36-8aa1-ff47b461fc54_1200x600.png" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a220ebf6-424f-4e36-8aa1-ff47b461fc54_1200x600.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:false,&quot;imageSize&quot;:&quot;full&quot;,&quot;height&quot;:600,&quot;width&quot;:1200,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:423848,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://heroicpandasec.substack.com/i/159128898?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa220ebf6-424f-4e36-8aa1-ff47b461fc54_1200x600.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-fullscreen" alt="" srcset="https://substackcdn.com/image/fetch/$s_!ipmU!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa220ebf6-424f-4e36-8aa1-ff47b461fc54_1200x600.png 424w, https://substackcdn.com/image/fetch/$s_!ipmU!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa220ebf6-424f-4e36-8aa1-ff47b461fc54_1200x600.png 848w, https://substackcdn.com/image/fetch/$s_!ipmU!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa220ebf6-424f-4e36-8aa1-ff47b461fc54_1200x600.png 1272w, https://substackcdn.com/image/fetch/$s_!ipmU!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa220ebf6-424f-4e36-8aa1-ff47b461fc54_1200x600.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p><code>[AUTHOR, seated in his favorite writing chair (you know, one of those wooden ones that look, like, really cool yet uncomfortable), stares intently at his laptop&#8217;s screen. The eyes behind his glasses blaze with the fire of confidence, a confidence that rises from knowing he is about to craft another masterpiece, ready to sculpt his words from the marble of the blogosphere. He delicately lowers his hands onto his laptop, like a pianist setting the scene for the first note of Chopin. He begins to type.] </code></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://heroicpanda.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Security for the Rest of Us is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>Merriam Webster&#8217;s dictionary defines &#8220;security engineering&#8221; as <a href="https://www.merriam-webster.com/dictionary/security%20engineering">"isn't in the dictionary"</a>&#8230;</p><p><code>[AUTHOR curses the dictionary gods. He lifts his gaze, staring into the distance, shocked that this dictionary-less thing is to be the focus of his next work.]</code></p><p>&#8220;Well, crap. No one&#8217;s <em>ever</em> started writing something by just copying a dictionary definition. I was sure I&#8217;d be the first&#8230; <em><strong>Now</strong></em> how am I supposed to start this post?,&#8221; he mutters to himself.</p><p>Surely there must be something just as brilliant as a copied dictionary definition for him to use?</p><p><code>[AUTHOR coughs gently into his right hand, hoping the reader doesn&#8217;t notice him frantically regathering his thoughts]</code></p><p>&#8220;Ahem,&#8221; he says, betraying his embarrassment ever so slightly. </p><p>&#8220;Let&#8217;s try this again, shall we?&#8221; </p><p><code>[AUTHOR begins typing once more.]</code></p><div><hr></div><p>Many moons ago, when I first began crossing the river of career change, I remember how unsure I was about exactly what kind of career I wanted in tech. Working my way through school doing IT support, I knew I loved helping people, but I knew that tech support itself wasn&#8217;t my passion. I knew I enjoyed networking, especially the hands-on components (both CLI and with physical equipment), yet working with <em>truly</em> passionate network engineers I knew that likely wasn&#8217;t my place. Coding was incredibly rewarding and challenging, but something told me that I didn&#8217;t want to only program things for the rest of my life. </p><p>Eventually, as part of a two-year, corporate IT rotational program, I landed a six-month stint on my company&#8217;s enterprise security team. This was my first true exposure to security in a professional context and, through that rotation, I was afforded opportunities to conduct analysis, program solutions from scratch, and jump into real-world incident response efforts. I was hooked. From then on I knew that security was where belonged. </p><p>Here, I will dive into what I understand about the world of security engineering from my own experience. Also, I&#8217;ll rely heavily on reputable, not-me sources that are freely available so that you can form your own understanding of security engineering, too.</p><h1>What actually <em>is</em> security engineering?</h1><p>Raise your hand if you&#8217;ve ever started a school assignment or speech with something like, &#8220;Webster&#8217;s dictionary defines&#8230;&#8221;. I know I used to! And, while I was trying to give a snarky nod to ye olde tried-and-true method of beginning writing, the first step many of us take is to seek definitions for new terms, right? </p><p>Long, long ago, before the world was Google-fied, printed materials like dictionaries and encyclopedias were the first place people may go when seeking information on something new. You could thumb through the pages to get a researched summary about your topic of interest. Even in the early days of the internet, those trusted tomes that sat atop shelves were still what people would visit first, albeit digitally.</p><p>But, here we are in the year 2025, where trying to define something as new as &#8220;security engineering&#8221; is somewhat daunting. There are countless resources available, those well written and not, objective and not, and authentic and not. The challenge is that you, as the gatherer of knowledge, are supposed to determine what sources are reliable. </p><p>How does one start? How would <em>you</em> start?</p><p>Like any good blogger is wont to do, please allow me a moment to pretend that I have the knowledge coherently:</p><div class="pullquote"><p><strong>I define security engineering as the planning, building, maintaining, and optimizing of <a href="https://csrc.nist.gov/glossary/term/security_control">security controls</a>, scoped to the needs and demands of the given context.</strong></p></div><p>Now that I&#8217;ve gotten that moment of pride out of the way (bless you for letting me do that), here are some excellent resources that help paint a picture of what <strong>security engineering</strong> entails.</p><p>As LeVar Burton used to say in <em>Reading Rainbow</em>, &#8220;You don&#8217;t have to take my word for it!&#8221;</p><div id="youtube2-vAvQbEeTafk" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;vAvQbEeTafk&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/vAvQbEeTafk?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><h2> &#8220;Security Engineering&#8221; - Third Edition</h2><p>This textbook, written by an English professor named <a href="https://en.wikipedia.org/wiki/Ross_J._Anderson">Ross Anderson</a>, was first printed in 2001 and revised twice more before his unfortunate passing in 2024. While Anderson had always made several chapters available for download, for free, through a University of Cambridge website, the university made all chapters fully available a few months after his death (a lovely gesture, I think). </p><ul><li><p>Download all chapters of this seminal work <a href="https://www.cl.cam.ac.uk/archive/rja14/book.html">here</a></p><ul><li><p>Physical copies are available for purchase (I recommend only buying the latest edition with the green cover)</p></li></ul></li></ul><p>Ross Anderson was a stalwart presence in the global security community and his first chapter is devoted to the very purpose of defining security engineering. He begins Chapter 1 with:</p><blockquote><p><strong>Security engineering is about building systems to remain dependable in the face of malice, error, or mischance. As a discipline, it focuses on the tools, processes, and methods needed to design, implement, and test complete systems, and to adapt existing systems as their environment evolves.</strong></p></blockquote><p>Notice his use of broad terms like &#8220;building,&#8221; &#8220;systems,&#8221; and &#8220;tools&#8221;. As you explore security engineering as a topic, keep in mind how &#8220;security&#8221; encompasses many things, technical and not, and how &#8220;engineering&#8221; is not specific to coding alone.</p><ul><li><p>Think about <strong>systems</strong> - What are some examples of technical and non-technical systems?</p><ul><li><p>How might security factor into those systems that come to mind?</p></li></ul></li></ul><p>Also, take note of how Anderson calls out the constant need for evolution in security. Very few things in this world remain static and unchanging, so security engineering demands that professionals be nimble, adaptive, and capable of meeting the security needs of the moment.</p><p>The opening of this book is powerful as he eloquently states the purpose, need, and expectations of security engineering. His second paragraph continues on:</p><blockquote><p><strong>Security engineering requires cross-disciplinary expertise, ranging from cryptography and computer security through hardware tamper-resistance to a knowledge of economics, applied psychology, organisations and the law.</strong></p></blockquote><p>What a range of skills, right? He goes on to explain why a technical mindset alone is not enough:</p><blockquote><p><strong>System engineering skills, from business process analysis through software engineering to evaluation and testing, are also important; but they are not sufficient, as they deal only with error and mischance rather than malice. The security engineer also need s some skill at adversarial thinking, just like a chess player; you need to have studied lots of attacks that worked in the past, from their openings through their development to the outcomes.</strong></p></blockquote><p>In two paragraphs we have been told that security engineering demands that a slew of skills and acquired knowledge from many different areas. I&#8217;m a fan of Anderson&#8217;s definition in Chapter 1 because he gets straight to the point. He is telling us all that security engineering is remarkably complex, demanding, and, most importantly, that it may not be exactly what you think it is.</p><p>Side note: I swear I read beyond the first two paragraphs.</p><ul><li><p>For aspiring security engineers and/or security professionals, this book is, hands down, my primary recommendation</p><ul><li><p>It&#8217;s both <strong>FREE</strong> and <strong>fantastically thorough. </strong>For real. It&#8217;s a beautiful combo, right?</p></li><li><p>I just wanted to add another bullet&#8212;That first reason is reason enough!</p></li><li><p>Seriously, download this book (or purchase a copy). </p></li></ul></li></ul><p>Let&#8217;s jump into another resource for defining <strong>security engineering</strong>.</p><h2>NIST</h2><p>While Ross Anderson&#8217;s book above is the best recommendation I can make for anyone, <a href="https://csrc.nist.gov/glossary/term/security_engineering">NIST</a> provides perhaps the most succinct and appropriate definition for security engineering:</p><blockquote><p><strong>An interdisciplinary approach and means to enable the realization of secure systems. It focuses on defining customer needs, security protection requirements, and required functionality early in the systems development lifecycle, documenting requirements, and then proceeding with design, synthesis, and system validation while considering the complete problem.</strong></p></blockquote><p>That&#8217;s it. Like I said, it&#8217;s succinct! </p><p>However, look at how NIST highlights &#8220;interdisciplinary&#8221; in a similar way to Anderson. Security engineering truly demands a focus across multiple disciplines.</p><p>Also, I love their phrasing of, &#8220;<strong>enable the realization of security systems</strong>&#8221;. In my own terms, I say &#8220;building&#8221;, but, I&#8217;m also not a well-staffed governmental organization full of fabulous professionals with stellar vocabularies. &#8220;[Enabling] the realization&#8221; of systems may mean planning, may mean research, may mean systems design, or it may mean a thousand other things.</p><p>My main point with these first two sources is to challenge your thinking of the term engineering and hopefully broaden your concept of the term.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!2yln!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb396eeb1-c2a5-4ea7-85d0-adfdddafd52d_1342x939.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!2yln!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb396eeb1-c2a5-4ea7-85d0-adfdddafd52d_1342x939.jpeg 424w, https://substackcdn.com/image/fetch/$s_!2yln!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb396eeb1-c2a5-4ea7-85d0-adfdddafd52d_1342x939.jpeg 848w, https://substackcdn.com/image/fetch/$s_!2yln!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb396eeb1-c2a5-4ea7-85d0-adfdddafd52d_1342x939.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!2yln!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb396eeb1-c2a5-4ea7-85d0-adfdddafd52d_1342x939.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!2yln!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb396eeb1-c2a5-4ea7-85d0-adfdddafd52d_1342x939.jpeg" width="728" height="509.38301043219076" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b396eeb1-c2a5-4ea7-85d0-adfdddafd52d_1342x939.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:false,&quot;imageSize&quot;:&quot;normal&quot;,&quot;height&quot;:939,&quot;width&quot;:1342,&quot;resizeWidth&quot;:728,&quot;bytes&quot;:67120,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://heroicpandasec.substack.com/i/159128898?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb396eeb1-c2a5-4ea7-85d0-adfdddafd52d_1342x939.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!2yln!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb396eeb1-c2a5-4ea7-85d0-adfdddafd52d_1342x939.jpeg 424w, https://substackcdn.com/image/fetch/$s_!2yln!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb396eeb1-c2a5-4ea7-85d0-adfdddafd52d_1342x939.jpeg 848w, https://substackcdn.com/image/fetch/$s_!2yln!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb396eeb1-c2a5-4ea7-85d0-adfdddafd52d_1342x939.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!2yln!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb396eeb1-c2a5-4ea7-85d0-adfdddafd52d_1342x939.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2>The GitLab Handbook</h2><p><strong><a href="https://about.gitlab.com/">GitLab</a></strong> is a code repository management platform that is available both in open source and paid flavors, depending on your use case. Their product relies primarily on <strong><a href="https://git-scm.com/">Git</a></strong>, a file management system that also allows you to manage the versioning of files under its control. GitLab now bills itself as a wholistic DevSecOps management platform, but, for our purposes here, the main differentiator for GitLab is that you can use their cloud offering or host it yourself on your own systems (as opposed to GitHub, which is cloud-based).</p><ul><li><p><strong>Interested in learning more about Git?</strong></p><ul><li><p>Codecademy offers a free interactive, introductory course: <a href="https://www.codecademy.com/learn/learn-git">Learn Git &amp; GitHub</a></p></li></ul></li><li><p><strong>Looking for a completely open source offering for Git?</strong></p><ul><li><p>Check out <strong><a href="https://gogs.io/">Gogs</a></strong> - 100% free and open source</p></li></ul></li></ul><p>In addition to making their product open source, GitLab has graciously offered their <a href="https://handbook.gitlab.com/handbook/about/">GitLab Handbook</a> to the world. Their handbook, <a href="https://about.gitlab.com/blog/our-handbook-is-open-source-heres-why/">shared publicly</a>, houses all kinds of knowledge about GitLab from the mundane to the detailed, from typical &#8220;company handbook&#8221; kind of language to deep dives into internal workings, values, and decision making. For job seekers, GitLab posts detailed information about each role, and not just about the role itself, but every level of that role.</p><p>Speaking of levels, GitLab lists Security Engineer roles as a &#8220;<a href="https://handbook.gitlab.com/handbook/total-rewards/compensation/compensation-calculator/#gitlab-job-grades">grade 6</a>&#8221; role, an intermediate position in GitLab parlance. You will very rarely see security engineering positions set to a lower grade.</p><p>Their handbook is a monstrosity (in a good way), so take some time to swim around.</p><p>Fortunately for us, those curious about security engineering, they pull back the curtain to reveal how they define <a href="https://handbook.gitlab.com/job-families/security/security-engineer/">security engineering at GitLab</a>.</p><p>What I love about their write up is how they separate hard skills that are necessary for the role, explain the general responsibilities to be expected, and showcase the different areas of focus that exist for security engineers at GitLab. Their <a href="https://handbook.gitlab.com/job-families/security/security-engineer/#general-requirements-for-security-engineer-roles">general requirements</a> are:</p><blockquote><ul><li><p>You have a passion for security and open source</p></li><li><p>You are a team player, and enjoy collaborating with cross-functional teams</p></li><li><p>You are a great communicator</p></li><li><p>You employ a flexible and constructive approach when solving problems</p></li><li><p>You share our <a href="https://handbook.gitlab.com/handbook/values/">values</a>, and work in accordance with those values</p></li><li><p>Ability to use GitLab</p></li></ul></blockquote><p>Aside from the final bullet, the rest of this is very run-of-the-mill when it comes to job descriptions you&#8217;ll see when job hunting. However, what&#8217;s great is how they have made these basic requirements so broad that it opens the door for a wide variety of educations, experience, and expertise. </p><p>Let&#8217;s highlight a couple of these generic points:</p><blockquote><p>You have a <strong>passion for security and open source</strong></p></blockquote><p>If I were to ask you, &#8220;Do you have a <em>passion</em> for security?&#8221;, what would you say? Do you think that listening to podcasts is enough, or do you have a portfolio that you could share which demonstrates your passion?</p><ul><li><p>For job seekers, this is critical - take time to reflect, brainstorm, and put pen to paper on exactly how you&#8217;d articulate your passion for security.</p><ul><li><p>Practice your reply! No, seriously. Stand in front of a mirror and practice. Build your confidence in both material and tone of voice (written or spoken) so that you nail it come interview time. This is especially true for entry level/lower level roles.</p></li></ul></li></ul><p>The open source community is a global community that is a passionate one in and of itself. While contributing to an open source project is a major feather in your cap, don&#8217;t think that you <em>have</em> to be an <a href="https://opensauced.pizza/docs/community-resources/so-youre-interested-in-being-an-open-source-maintainer/">open source maintainer</a> in order to know about that world of tech. There are many open source products that you can install yourself, run locally, then learn as you go. Simply being familiar with and knowing how to use  different open source offerings will add an extra dash of sparkle to your resume.</p><p>I know this article isn&#8217;t about passion, but, think about it&#8212;if you were to say you were passionate about something, could you explain <em>why</em> you&#8217;re passionate? In the tech world, you will hear everyone say that they&#8217;re passionate about one part of their job or another. Make yourself stand out by being prepared to explain and showcase <em>why</em> you&#8217;re passionate about tech.</p><blockquote><p>You are a <strong>great communicator</strong></p></blockquote><p>Boy, do I love GitLab so much for including this! Kudos! </p><p>As a security engineer, you will be expected to communicate equally well with both technical and non-technical audiences. You may even be expected to share information with broader audiences, or perhaps the entire company. Please don&#8217;t be fooled whenever you see that communication skills are mentioned as &#8220;soft skills&#8221;. The ability to excel in communication is absolutely a hard skill, just as important as coding, and will be vital your career. </p><ul><li><p><em><strong>Think</strong></em> - How well do I communicate ideas, feelings, analysis/reports, etc. to others? Is my message clear? What is my tone and how are my communications impacting others? Can I adjust </p></li></ul><p>Now, back to the technical stuff. We&#8217;ll keep leveraging the GitLab handbook because it&#8217;s awesome (and you should be leveraging it anyway)</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!hNoq!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c56679f-8d28-4959-92c6-ca159cafaa4e_1051x351.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!hNoq!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c56679f-8d28-4959-92c6-ca159cafaa4e_1051x351.png 424w, https://substackcdn.com/image/fetch/$s_!hNoq!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c56679f-8d28-4959-92c6-ca159cafaa4e_1051x351.png 848w, https://substackcdn.com/image/fetch/$s_!hNoq!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c56679f-8d28-4959-92c6-ca159cafaa4e_1051x351.png 1272w, https://substackcdn.com/image/fetch/$s_!hNoq!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c56679f-8d28-4959-92c6-ca159cafaa4e_1051x351.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!hNoq!,w_2400,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c56679f-8d28-4959-92c6-ca159cafaa4e_1051x351.png" width="1200" height="400.76117982873456" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0c56679f-8d28-4959-92c6-ca159cafaa4e_1051x351.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:false,&quot;imageSize&quot;:&quot;large&quot;,&quot;height&quot;:351,&quot;width&quot;:1051,&quot;resizeWidth&quot;:1200,&quot;bytes&quot;:125347,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://heroicpandasec.substack.com/i/159128898?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcdc827a6-0896-4743-9923-7483bb7d49ff_1200x600.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-large" alt="" srcset="https://substackcdn.com/image/fetch/$s_!hNoq!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c56679f-8d28-4959-92c6-ca159cafaa4e_1051x351.png 424w, https://substackcdn.com/image/fetch/$s_!hNoq!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c56679f-8d28-4959-92c6-ca159cafaa4e_1051x351.png 848w, https://substackcdn.com/image/fetch/$s_!hNoq!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c56679f-8d28-4959-92c6-ca159cafaa4e_1051x351.png 1272w, https://substackcdn.com/image/fetch/$s_!hNoq!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c56679f-8d28-4959-92c6-ca159cafaa4e_1051x351.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2>Specialties within Security Engineering</h2><p>GitLab also shares several <strong>specialties</strong> of security engineering. </p><p>This is helpful because, yes, you may be a security engineer, but at most larger companies you will have a primary area of focus. Depending on company size, you may be the only person within that specialty, or, if you&#8217;re lucky enough, part of a larger team that&#8217;s devoted to one thing in particular.</p><p>For the energy impaired (i.e. &#8220;lazy&#8221;, like me) I&#8217;ve included links below to the different specialties they list as I think it captures most of the specialties you&#8217;ll encounter in the wild:</p><h4><a href="https://handbook.gitlab.com/job-families/security/security-engineer/#application-security">Application Security</a></h4><ul><li><p>The cool kids call this &#8220;AppSec&#8221; for short (tech has a thirst for three-letter abbreviations of words - it&#8217;s a thing)</p></li><li><p>AppSec engineers tend to have strong backgrounds in software engineering, if not formal software engineering experience.</p></li><li><p>All companies have a given tech stack that they work with and list their tech within job descriptions. AppSec professionals need to have relevant experience and expertise in whatever the applicable tech stack is, or the ability to upskill into the tech of focus.</p></li><li><p>This is usually a highly technical role and may be deeply embedded within engineering teams.</p><ul><li><p>Some excellent articles on AppSec (listed as the respective publishing company): </p><ul><li><p><a href="https://www.paloaltonetworks.com/cyberpedia/appsec-application-security">Palo Alto Networks</a>, <a href="https://www.wiz.io/academy/application-security">Wiz</a>, <a href="https://github.com/resources/articles/security/what-is-application-security">GitHub</a>, <a href="https://developer.okta.com/blog/2022/05/09/beginners-app-sec">Okta</a>, <a href="https://snyk.io/articles/application-security/">Snyk</a></p></li></ul></li></ul></li><li><p>There&#8217;s an amazing set of Stanford lectures that is 100% worth a watch if you&#8217;re interested in foundational concepts. It&#8217;s a few years old but worth it&#8217;s weight in gold (19 videos in total). The course is CS 253 - Web Security:</p><div id="youtube2-5JJrJGZ_LjM" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;5JJrJGZ_LjM&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/5JJrJGZ_LjM?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div></li></ul><h4><a href="https://handbook.gitlab.com/job-families/security/security-engineer/#product-security-engineering">Product Security</a> </h4><ul><li><p>Just like with AppSec above, this is another heavily technical role that involves tons of time within a given codebase.</p><ul><li><p>AppSec and Product Security are very closely related. As <a href="https://www.csoonline.com/article/650586/how-cisos-can-broaden-the-focus-from-application-security-to-product-security.html">this article</a> from CSO Online states, &#8220;Product security expands the scope of traditional application security well beyond testing and into the realms of advocacy, collaboration between business groups, design thinking, threat modeling, architectural planning and true risk management.&#8221;</p></li><li><p>However, Product Security engineers may be more heavily involved in the design and development stages, making sure that security is baked into a product from the onset.</p></li></ul></li><li><p>This is a newer role that has grown out of the broader AppSec realm.</p></li><li><p>You may be assigned to a particular product or an specific part of the larger product your company builds, then be responsible for improving and testing its security. You could also easily be the Product Security Engineer for multiple projects at once.</p></li><li><p>This is another role that&#8217;s deeply embedded with software engineering. Software teams will rely on product security engineer to stay current with potential attack vectors, potential risks within the software supply chain, and any other security considerations that may be relevant for the assigned product.</p><ul><li><p>NOTE: Hardware products are a thing, too! </p></li></ul></li><li><p>You may be called upon as the go-to security resource should customers or prospective customers have questions about your product&#8217;s security.</p></li><li><p>Snyk offers a nice breakdown of the differences between Product Security and AppSec: </p><ul><li><p><strong><a href="https://snyk.io/articles/enterprise-security/product-security-vs-application-security/">Product Security vs. Application Security: What&#8217;s the Difference?</a></strong></p></li></ul></li><li><p>Here&#8217;s an area where I, too, want to learn more about! Check out these resources that I found informative: </p><ul><li><p><a href="https://owasp.org/www-project-product-security-guide/">OWASP Product Security Guide</a>, <a href="https://www.shopify.com/blog/product-security">Shopify blog</a></p></li><li><p>Adobe has its own &#8220;<a href="https://helpx.adobe.com/security.html">Adobe Product Security Incident Response Team</a>&#8221; (pretty cool)</p><ul><li><p>In looking at potential resources, I noticed how large companies like Adobe have product security-specific IR teams, which is awesome.</p></li></ul></li><li><p>Article by McKinsey &amp; Company, <em><a href="https://www.mckinsey.com/capabilities/risk-and-resilience/our-insights/cybersecurity/product-security-navigating-regulations-and-customer-expectations">Product security: Navigating regulations and customer expectations</a></em></p></li></ul></li><li><p>This RSA Conference talk is interesting and serves as an primer for the field of Product Security: <em><strong>Infosec Makeover: Love it or Leave it, Product Security is Here to Stay</strong></em></p><div id="youtube2-mwV4IvGngk0" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;mwV4IvGngk0&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/mwV4IvGngk0?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div></li></ul><h4><a href="https://handbook.gitlab.com/job-families/security/security-engineer/#signals-engineering">Signals Engineering</a></h4><ul><li><p>GitLab chose the word &#8220;Signals&#8221;, which I like, as it is generic to cover almost anything. You may also see '&#8220;<strong>Detection Engineering</strong>&#8221; or something similar at other companies. Some companies have signals engineering mixed in with broader security engineering roles.</p></li><li><p>There is plenty to dive into here - often you are expected to be, or become, a subject matter expert in your company&#8217;s <a href="https://www.crowdstrike.com/en-us/cybersecurity-101/next-gen-siem/security-information-and-event-management-siem/">SIEM</a> tool and other tools that are responsible for handling event subscription data from many different systems</p></li><li><p>This easily ties into a realm that most are familiar with, <a href="https://www.microsoft.com/en-us/security/business/security-101/what-is-vulnerability-management#:~:text=FAQs-,Vulnerability%20management%20defined,from%20cyberattacks%20and%20data%20breaches.">Vulnerability Management</a>, as many alerts correlate directly to a <a href="https://www.cve.org/about/overview">CVE</a>/<a href="https://cwe.mitre.org/about/index.html">CWE</a> or a specific vulnerability within a given technology</p></li><li><p>Just like how AppSec and Product Security engineers will also need to be abreast the latest vulnerabilities within a codebase, signals engineers will need to stay vigilant in regard to threat intelligence and security bulletins from reputable agencies</p><ul><li><p>Most signals tooling will help greatly (breathe a sigh of relief in knowing you don&#8217;t need to know everything)</p></li></ul></li><li><p>Depending on the company, you may be expected to have expertise concerning their <a href="https://www.ibm.com/think/topics/siem#:~:text=Security%20information%20and%20event%20management%2C%20or%20SIEM%2C%20is%20a%20security,chance%20to%20disrupt%20business%20operations.">SIEM</a> of choice.</p></li><li><p>Further resources for signals/detection engineering:</p><ul><li><p>Best article I can recommend: <em><strong><a href="https://trustedsec.com/blog/on-the-road-to-detection-engineering">On the Road to Detection Engineering</a></strong></em> from the TrustedSec blog</p><ul><li><p>A team member at TrustedSec gives insightful career advice, plus offers numerous resources for folks to dive into</p></li></ul></li><li><p><a href="https://www.crowdstrike.com/en-us/cybersecurity-101/next-gen-siem/detection-engineering/">Crowdstrike blog</a> (can you tell yet that I like their stuff?), <a href="https://www.wiz.io/academy/detection-engineering">Wiz blog post</a> (their blog is gold, always)</p></li></ul></li><li><p>Here&#8217;s a really cool MITRE course that&#8217;s available for free on YouTube (33 videos in total): <em><strong>MAD20 Threat Hunting &amp; Detection Engineering Course</strong></em></p><div id="youtube2-a-aQS3R2qXo" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;a-aQS3R2qXo&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/a-aQS3R2qXo?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div></li></ul><h4><a href="https://handbook.gitlab.com/job-families/security/security-engineer/#signals-engineering">SIRT - Security Incident Response Team</a></h4><ul><li><p>Any company with a security program will have some mechanism of incident response (sometimes called &#8220;IR&#8221;), even if it&#8217;s just listed in dusty policy documents somewhere.</p></li><li><p>Wiz maintains beautiful documentation on IR, so check it out: <a href="https://www.wiz.io/academy/incident-response-team">Incident response team depth chart</a></p><ul><li><p><a href="https://www.atlassian.com/incident-management/incident-response/roles-responsibilities#incident-manager">Atlassian</a> also has wonderful information here, too, with many layers of detail.</p></li></ul></li><li><p>&#8220;SIRT&#8221; itself isn&#8217;t a standard naming convention, with each company tending to have some flavor of that acronym. &#8220;CIRT&#8221; is also common. The name itself is less important than having an actual plan in place for how to handle an incident.</p></li><li><p>There may be dedicated incident response team members at a company, but what&#8217;s more likely is for security teams to have specific responsibilities, should an incident arise.</p><ul><li><p>This means that they&#8217;re doing engineering or analyst work most of the time and only performing IR duties as needed.</p></li></ul></li><li><p>Members of an incident response team may take on any number of responsibilities (see the Wiz article above). Here are some:</p><ul><li><p><strong><a href="https://www.atlassian.com/incident-management/incident-response/incident-commander">Incident commander</a></strong> = This is the primary point person for a given incident. They ensure that incident handling procedures are followed and are responsible for coordinating incident-related efforts. Communication skills are crucial for success in this role.</p></li><li><p><strong>Tech lead(s) / Subject matter expert(s)</strong> = Your company&#8217;s policies may enforce the inclusion of specific technical team leads/company leads by default, but, typically, there are one or more technical experts brought into an incident if technical elements are involved. They may perform technical tasks directly or responsibly delegate tasks to their teams.</p></li><li><p><strong>Communications</strong> <strong>lead</strong> = This individual brings communications expertise to the group and may be responsible for communicating to internal stakeholders, external parties (like customers), or the company at large. They are the ones who paint a picture of the incident to a given audience, likely taking information from other incident responders and carving a message that is both effective and appropriate. Communication skills are (obviously) critical here.</p></li><li><p><strong>Legal / HR </strong>= This individual, or, more likely, these <em>individuals</em>, may be read-in depending on the type and scope of the incident at hand. </p><ul><li><p><strong>Legal counsel</strong>, whether full-time attorneys who work for the company or outside legal assistance, may be brought in to assess obligations according to the law, potential legal ramifications (if applicable), and general consultation. </p></li><li><p><strong>HR</strong> is typically involved if there is direct impact to employees/employee information, or as a consultative resource when employees are involved with an incident. HR professionals may assist with gathering legal requirements or handling internal discussions.</p></li></ul></li></ul></li><li><p>There are many roles that a company may choose to assign, but, in the very least, incidents usually demand:</p><ol><li><p>Someone to lead/coordinate the incident effort</p></li><li><p>Someone with the requisite skills to help (diagnose, fix, analyze, etc.)</p></li><li><p>Someone to communicate effectively, efficiently, and in a timely manner.</p></li></ol><ul><li><p><em>NOTE</em> - One person may take on multiple duties (smaller organizations), or each team member may have specific responsibilities that are narrow in scope (typically larger organizations)</p></li></ul></li><li><p>Incident response is a tremendously broad category (which might make a good article in the future&#8230;). Check out more information on IR from these companies:</p><ul><li><p><a href="https://www.sentinelone.com/cybersecurity-101/services/incident-response-team/">SentinelOne</a>, <a href="https://firehydrant.com/blog/incident-response-team-roles-responsibilities-defined/">FireHydrant</a>, <a href="https://www.cisa.gov/careers/work-rolescyber-defense-incident-responder">CISA IR job role</a> (pretty cool), <a href="https://www.ncsc.gov.uk/collection/incident-management/creating-incident-response-team">National Cyber Security Centre</a></p></li></ul></li><li><p>For a friendly, beginner-level introduction to incident response work, here&#8217;s the Incident Detection &amp; Response videos from Google&#8217;s Cybersecurity Certificate (the best beginner certification, in my opinion).</p><ul><li><p>They brought all of the individual videos together from the curriculum, combining them into one, long piece of content.</p></li><li><p>The supplemental materials are available for free in the description.</p></li><li><p>Google did amazing work in crafting this curriculum. I can&#8217;t recommend the Google Cybersecurity Certificate content enough for new learners.</p><div id="youtube2-MsGl6lX-YaI" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;MsGl6lX-YaI&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/MsGl6lX-YaI?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div></li></ul></li></ul><div><hr></div><p>In my opinion, the categories above are what most security engineers typically fall under. However, like I said before (props to LeVar Burton), &#8220;You don&#8217;t have to take my word for it&#8221;. </p><p>As GitLab demonstrates in their handbook, security engineers come in all shapes and flavors. Here are the other categories that GitLab lists as falling under the umbrella of &#8220;security engineering&#8221;:</p><ul><li><p><strong><a href="https://handbook.gitlab.com/job-families/security/security-engineer/#trust--safety">Trust &amp; Safety</a></strong></p></li><li><p><strong><a href="https://handbook.gitlab.com/job-families/security/security-engineer/#security-assurance">Security Assurance</a></strong></p></li><li><p><strong><a href="https://handbook.gitlab.com/job-families/security/security-engineer/#security-architect">Security Architect</a></strong></p></li><li><p><strong><a href="https://handbook.gitlab.com/job-families/security/security-engineer/#product-security-risk--metrics">Product Security Risk &amp; Metrics</a></strong></p></li></ul><div><hr></div><h1>Impact of Security Engineering</h1><p>If you already have experience of some kind in a security discipline then you know that the term &#8220;security&#8221; is a broad term that yearns for specificity. Why? Because you can apply security practices, and therefore security engineering skills, to any number of areas within an organization. </p><p>This is why I spent so much time walking through GitLab&#8217;s security engineering specialties. People need to know that security engineering is more than just one discipline or set of skills. The real world demands agility and the ability for engineers to apply their problem solving skills to a range of issues.</p><div class="pullquote"><p>People need to know that security engineering is more than just one discipline or one set of skills.</p></div><p>That&#8217;s it&#8212;problem solving. If I were to write a job posting for a security engineer today, I&#8217;d make sure to say how a great security engineer is a <em>problem solving</em> security engineer. And &#8220;problem solving&#8221; is a great way to put it. Separate those two words into their own categories and you have engineers that tackle the best of both worlds: investigate, analyze, and diagnose the <strong>problem</strong> while always ideating, proposing, and building the <strong>solution </strong>to the problem. </p><p>Security engineering, apart from a specific role, could easily be a mindset that you adopt as you dive into issues begging for a solution. Any realm of security has room for engineering excellence.</p><h2>What a Difference a Title Makes</h2><p>Before I release you from this temporary prison of overly long articles, I want to make a point about job titles. Some of you may already be engineers by title, and some of you may be sitting in other, non-engineering roles and seeking to work into the engineering field. There also might be a portion of you who don&#8217;t even work in security at all and are soaking up knowledge, preparing for career change.</p><p>Words don&#8217;t do justice for how excited I was when I promoted to Security Engineer (also, I don&#8217;t think I have enough brain juice left after writing to add anything flowery enough). I was seriously overjoyed! And, in all seriousness, one of my main drivers nowadays is to help others achieve <em>their</em> career aspirations, knowing how much it meant for me to achieve one of mine.</p><p>However, while titles are important, they do not define you. Security engineers rarely <em>only</em> engineer. I&#8217;ve seen security engineers do project planning, incident handling, customer communications, audit planning, and even the super thrilling work of documentation writing. As with any role, the organization and/or the situation may demand sets of skills that lay outside of security engineering itself. This is a major reason why I love the wide net that GitLab casts when it describes its security engineers. GitLab recognizes how security engineering skills touch across many, if not all, areas of the business.</p><p>Furthermore, you could be performing security engineering tasks <em>without</em> the title of Security Engineer. I&#8217;ve seen IT Help Desk teammates jump into automation work, Security Analysts script solutions that check for compliance tasks, and I&#8217;ve seen many software engineers who have a knack for security and incorporate those principles on a daily basis. </p><p>If you&#8217;re not a security engineer and you want to become one, start looking for areas of opportunity to apply security within your day-to-day work. I can&#8217;t encourage this enough! Widen your perception of &#8220;engineering&#8221; to be &#8220;building&#8221; instead and you will start to see a world of possibilities before you. </p><div><hr></div><p>In general, I know that my tech career journey is not very unique. Lots of people transition from non-technical careers into tech and lots of people get their start in IT support and work their way up. Then, lots of people are dedicated to breaking directly into security itself. For me, I stumbled into security and then fell in love with building solutions that solve security problems and I enjoy my work. 10/10 would recommend.</p><p>Am I an engineer? Absolutely. Are there many different kinds of engineers? Absolutely.</p><p>Am I the best engineer I know? Absolutely NOT (there are people I know who could beat me in their sleep). </p><p>Do you have to be a god-level techie before you can become an engineer? Absolutely not.</p><p>Hopefully this post has helped to tickle that itch of curiosity you had for security engineering. Please share your thoughts below or reach out!</p><p></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://heroicpanda.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Security for the Rest of Us is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Literally Anything is Possible]]></title><description><![CDATA[How Gladiator II Taught Me To Find Success Through Imperfection]]></description><link>https://heroicpanda.com/p/literally-anything-is-possible</link><guid isPermaLink="false">https://heroicpanda.com/p/literally-anything-is-possible</guid><dc:creator><![CDATA[Nathan Walker]]></dc:creator><pubDate>Fri, 27 Dec 2024 17:10:18 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!5BgN!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc349e2e9-2e52-4ffd-ae4b-19866e1d9bb4_1800x600.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!5BgN!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc349e2e9-2e52-4ffd-ae4b-19866e1d9bb4_1800x600.png" data-component-name="Image2ToDOM"><div class="image2-inset image2-full-screen"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!5BgN!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc349e2e9-2e52-4ffd-ae4b-19866e1d9bb4_1800x600.png 424w, https://substackcdn.com/image/fetch/$s_!5BgN!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc349e2e9-2e52-4ffd-ae4b-19866e1d9bb4_1800x600.png 848w, https://substackcdn.com/image/fetch/$s_!5BgN!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc349e2e9-2e52-4ffd-ae4b-19866e1d9bb4_1800x600.png 1272w, https://substackcdn.com/image/fetch/$s_!5BgN!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc349e2e9-2e52-4ffd-ae4b-19866e1d9bb4_1800x600.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!5BgN!,w_5760,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc349e2e9-2e52-4ffd-ae4b-19866e1d9bb4_1800x600.png" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c349e2e9-2e52-4ffd-ae4b-19866e1d9bb4_1800x600.png&quot;,&quot;srcNoWatermark&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/19b4c086-922a-4249-81a7-f50a4f239fa5_1800x600.png&quot;,&quot;fullscreen&quot;:false,&quot;imageSize&quot;:&quot;full&quot;,&quot;height&quot;:485,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:108187,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-fullscreen" alt="" srcset="https://substackcdn.com/image/fetch/$s_!5BgN!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc349e2e9-2e52-4ffd-ae4b-19866e1d9bb4_1800x600.png 424w, https://substackcdn.com/image/fetch/$s_!5BgN!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc349e2e9-2e52-4ffd-ae4b-19866e1d9bb4_1800x600.png 848w, https://substackcdn.com/image/fetch/$s_!5BgN!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc349e2e9-2e52-4ffd-ae4b-19866e1d9bb4_1800x600.png 1272w, https://substackcdn.com/image/fetch/$s_!5BgN!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc349e2e9-2e52-4ffd-ae4b-19866e1d9bb4_1800x600.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3>A Gladiatorial Christmas</h3><p>If you and I were hanging out together and I asked you to name the movies you like to watch over the holidays, what movies would you include? <em>National Lampoon&#8217;s Christmas Vacation</em>? <em>The Santa Clause</em>? <em>The Muppet Christmas Carol</em>? <em>Elf</em>? <em>Home Alone</em>? <em>Home Alone 2</em>? <em>Die Hard</em>? All of these are likely to catch some air time in my home.</p><p>Sometimes, though, my family and I feel ambitious and decide to watch a new movie, like maybe rent something on-demand that was recently released. We felt that tickle for something new, so we decided to go for it. After some brief browsing we quickly settled on something we knew wanted to see&#8230;</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://heroicpanda.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Security for the Rest of Us is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>Gladiator II.</p><div id="youtube2-4rgYUipGJNo" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;4rgYUipGJNo&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/4rgYUipGJNo?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><p>$20 later and we were in, ready to enjoy the theatrical experience from our couch. I thought the original Gladiator was an epic adventure of a film, so I was excited to sit and experience Roman warfare on the big screen once more. </p><p>However, my excitement soon faded into a soft surprise. Then confusion. Then disappointment.</p><p>It wasn&#8217;t long before I found myself questioning what was happening in the movie:</p><ul><li><p>Why does it seem like just a remake of the original story?</p></li><li><p>Why do some interactions in the scene just seem&#8230; odd?</p></li><li><p>How is <em>every</em> archer able to shoot perfectly every time? </p></li><li><p>Why does Denzel&#8217;s performance stand out?</p></li><li><p>Why did two bannermen at the end lower their banners when no one else did?</p></li></ul><p>These are just a sample of the many questions that flashed across my mind throughout the film. I wanted this film to be good and I seriously <em>wanted</em> to enjoy it.</p><p>There were many times when it seemed like this movie was almost <em>too</em> like the first, so it seemed like an imitative retelling as opposed to a standalone, new chapter to the story. I couldn&#8217;t shake how there were many moments on screen where the acting was poor, or just awkward. There were even strange bits of editing (not a spoiler - there&#8217;s a moment later in the film where a wound has magically vanished between scenes) throughout that had me wondering if this was rushed through production. And Denzel Washington, a fabulous actor of legend, stood out because he was by far the best actor in the room. However, it seemed like he was trying to pull more out of the script than the script itself had to offer. Even the music felt cheapened to me, forecasting the emotions to come or not quite matching the scene it accompanied.</p><p>And seriously, the arrows don&#8217;t miss. Ever. Like, weirdly accurate. They just don&#8217;t make archers like they used to, I guess.</p><p>All in all, it just wasn&#8217;t a good movie to me. Period. </p><p>Not Space Jam 2 terrible, mind you, but it was not at all the blockbuster film I hoped it would be.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!zF15!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc0b327c0-ad73-4ae0-b42b-8bb5dff9f04d_1792x1024.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!zF15!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc0b327c0-ad73-4ae0-b42b-8bb5dff9f04d_1792x1024.webp 424w, https://substackcdn.com/image/fetch/$s_!zF15!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc0b327c0-ad73-4ae0-b42b-8bb5dff9f04d_1792x1024.webp 848w, https://substackcdn.com/image/fetch/$s_!zF15!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc0b327c0-ad73-4ae0-b42b-8bb5dff9f04d_1792x1024.webp 1272w, https://substackcdn.com/image/fetch/$s_!zF15!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc0b327c0-ad73-4ae0-b42b-8bb5dff9f04d_1792x1024.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!zF15!,w_2400,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc0b327c0-ad73-4ae0-b42b-8bb5dff9f04d_1792x1024.webp" width="1200" height="685.7142857142857" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c0b327c0-ad73-4ae0-b42b-8bb5dff9f04d_1792x1024.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:false,&quot;imageSize&quot;:&quot;large&quot;,&quot;height&quot;:832,&quot;width&quot;:1456,&quot;resizeWidth&quot;:1200,&quot;bytes&quot;:682684,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/webp&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-large" alt="" srcset="https://substackcdn.com/image/fetch/$s_!zF15!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc0b327c0-ad73-4ae0-b42b-8bb5dff9f04d_1792x1024.webp 424w, https://substackcdn.com/image/fetch/$s_!zF15!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc0b327c0-ad73-4ae0-b42b-8bb5dff9f04d_1792x1024.webp 848w, https://substackcdn.com/image/fetch/$s_!zF15!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc0b327c0-ad73-4ae0-b42b-8bb5dff9f04d_1792x1024.webp 1272w, https://substackcdn.com/image/fetch/$s_!zF15!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc0b327c0-ad73-4ae0-b42b-8bb5dff9f04d_1792x1024.webp 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3>If Gladiator II Can Make It&#8230;</h3><p>After watching the film, I just couldn&#8217;t shake the feeling of being cheated by the hype. Looking online afterward, I saw that <a href="https://www.rottentomatoes.com/m/gladiator_ii">Rotten Tomatoes</a> had given it a &#8220;Certified Fresh&#8221; rating of 71% by critics, not far away from the original film&#8217;s score of <a href="https://www.rottentomatoes.com/m/gladiator">80%</a>. The &#8220;Popcornmeter&#8221;, the name for audience ratings on Rotten Tomatoes, sat at 82%. I was shocked! </p><p>Has my taste in cinema changed over the years? Am I not able to recognize what&#8217;s objectively &#8220;good&#8221; anymore? Am I losing it?!</p><p><code>[NATHAN CRIES OUT TO THE HEAVENS - EXITS STAGE LEFT, SOBBING]</code></p><p>Fortunately, I have a partner that agreed with me - they couldn&#8217;t believe how bad it was, either. </p><p>I&#8217;m sure that someone reading this will have seen Gladiator II and enjoyed it (if you&#8217;re one of those people, please, please tell me how on Earth you liked it). And that&#8217;s great! We all have different tastes and opinions when it comes to creative productions like music, movies, and art. It&#8217;s okay to disagree, or for one person to enjoy what another does not.</p><p>In questioning my life after enduring that slog of a feature film, I thought: </p><blockquote><p><strong>If Gladiator II can be greenlit for production, then anyone can do literally anything. Anything is possible.</strong></p></blockquote><p>Seriously. More than one person sat in a room together, or in many rooms for many different kinds of togethers, in order to give the thumbs-up to make this movie happen. More than one person, possibly many persons who had given the okay for successful films before, allowed this film to be bankrolled to the tune of over <a href="https://www.imdb.com/news/ni64456460/">$300 million USD</a>. As far as I can tell, <a href="https://www.boxofficemojo.com/title/tt9218128/">worldwide box office gross</a> has at least given people their money back, but it&#8217;s a far cry from the <a href="https://www.boxofficemojo.com/title/tt0172495/">4x return on investment</a> received through the original movie that debuted in 2000.</p><p>I&#8217;m being harsh in my critique, I know. I do think there&#8217;s a lesson to be learned here. </p><p>In less than the time it would take for you to view this Roman, filmic tragedy for yourself, I will expand on three points:</p><ul><li><p>That something can be &#8220;good enough&#8221; without having to be perfect, </p></li><li><p>That imperfect things can still be <strong>successful</strong> things, and</p></li><li><p>Embracing imperfection is key to successful security</p></li></ul><p>So, in a way, Gladiator II did bring some positive mental motions into my life as it forced me to wrestle with these ideas. </p><p>Thank you, Ridley Scott. <code>[insert fist bump]</code></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!B6v9!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F621d6fb2-8cde-4002-98ee-590b4354073a_1800x900.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!B6v9!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F621d6fb2-8cde-4002-98ee-590b4354073a_1800x900.png 424w, https://substackcdn.com/image/fetch/$s_!B6v9!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F621d6fb2-8cde-4002-98ee-590b4354073a_1800x900.png 848w, https://substackcdn.com/image/fetch/$s_!B6v9!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F621d6fb2-8cde-4002-98ee-590b4354073a_1800x900.png 1272w, https://substackcdn.com/image/fetch/$s_!B6v9!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F621d6fb2-8cde-4002-98ee-590b4354073a_1800x900.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!B6v9!,w_2400,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F621d6fb2-8cde-4002-98ee-590b4354073a_1800x900.png" width="1200" height="600" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/621d6fb2-8cde-4002-98ee-590b4354073a_1800x900.png&quot;,&quot;srcNoWatermark&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/633e708b-31ce-48ab-b760-dfc1e5a9f43c_1800x900.png&quot;,&quot;fullscreen&quot;:false,&quot;imageSize&quot;:&quot;large&quot;,&quot;height&quot;:728,&quot;width&quot;:1456,&quot;resizeWidth&quot;:1200,&quot;bytes&quot;:199556,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-large" alt="" srcset="https://substackcdn.com/image/fetch/$s_!B6v9!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F621d6fb2-8cde-4002-98ee-590b4354073a_1800x900.png 424w, https://substackcdn.com/image/fetch/$s_!B6v9!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F621d6fb2-8cde-4002-98ee-590b4354073a_1800x900.png 848w, https://substackcdn.com/image/fetch/$s_!B6v9!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F621d6fb2-8cde-4002-98ee-590b4354073a_1800x900.png 1272w, https://substackcdn.com/image/fetch/$s_!B6v9!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F621d6fb2-8cde-4002-98ee-590b4354073a_1800x900.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>.</p><h1>Perfectionism vs. &#8220;Good Enough&#8221;</h1><h3>The Labor of Creativity</h3><p>Years ago, as a young, wee lad in music school, I clearly remember the torturous task that was creating music. Sometimes, this torture was rapture, what I&#8217;d probably liken to being keenly &#8220;in the zone&#8221;. You&#8217;re tortured because you can&#8217;t focus on anything else (relationships, important classwork that may be due the next day, etc.) yet in a state of bliss as you surf along waves and waves of creative thought. I was no Mozart, who was able to pull fully formed symphonies directly from his brain, but I was passionate. And that passion could keep me focused on writing music for hours and hours on end.</p><p>More often than not, however, the torture of music writing was <em>not</em> rapturous, but more like, well, torture (and who says &#8220;torture was rapture&#8221; anyways? Yikes, Nathan&#8230;). I wish I could count the number of days spent staring blankly at an empty piece of plain manuscript paper. I knew the paper was just begging me to write something, anything, yet my pencil would not budge. My hands would not move. It wasn&#8217;t torture because my mind was blank and I had nothing to write, it was torture because I had so many ideas in my head. Too many ideas, perhaps. I wasn&#8217;t sketching to catch a breeze of inspiration that might generate my next big idea, I was trying to strike gold before my pen even hit the paper. </p><p><strong>I only wanted to write the &#8220;best&#8221; music possible, which at the time meant writing something that I thought other people would like</strong>. I wanted to just, create, but not as badly as I wanted other people to appreciate what I had created.</p><p>I&#8217;ve written many pieces of music in my life, that&#8217;s for sure. Yet if I were to throw my stack of unfinished pieces at you it might get me arrested for assault because there&#8217;s so many of them, plus I don&#8217;t think I&#8217;m strong enough to lift it (also papercuts are the worst, right?). </p><p>What I mean is there are many more pieces I <em>didn&#8217;t</em> complete or continue with just because I didn&#8217;t think they were good enough. I was taking the step of labeling my own work a failure before that pie of creativity was even in the oven.</p><h3>Fearing Failure</h3><p>Eventually I would come to learn that even some of the most highly regarded composers of all time were perfectionists, often discarding the work if they deemed it subpar. <a href="https://en.wikipedia.org/wiki/Johannes_Brahms#:~:text=Brahms%20loved%20the%20classical%20composers,Mozart%20as%20the%20greatest%20composer.">Brahms</a> did this, for example. Now that I&#8217;m older and removed from those music days, I think that it was mixture of perfectionism and a fear of failure in general. Sometimes I was able to write from the heart to create something that felt genuine and sometimes I found myself plagued by the fear that other people wouldn&#8217;t like what I had made. This was dreadful for me at the time. It was a driving fear, a constant anxiety, a shadow that loomed across my creative process.</p><p>Having a fear of failure is nothing new to me personally, I know that. And I would hazard a guess that you know the exact feeling I&#8217;m talking about, too. </p><p>In looking at the <a href="https://www.psychologytoday.com/us/blog/the-squeaky-wheel/201306/10-signs-that-you-might-have-fear-of-failure">10 Signs That You Might Have Fear of Failure</a>, you&#8217;d think that I should have &#8220;fear of failure&#8221; as a line item in my medical history.  I find comfort in knowing that this is a common cloud that hovers over many people&#8217;s lives and not just the lives of musicians. It&#8217;s helped me to learn that there are ways to help one&#8217;s self overcome such a fear.</p><p>For a sample of how you can work to cope with the fear of failure, the University at Buffalo&#8217;s School of Social Work has <a href="https://socialwork.buffalo.edu/content/dam/socialwork/home/self-care-kit/readings/overcoming-fear-of-failure.pdf">shared a guide with approachable steps</a> that anyone can tackle (heads up&#8212;the link points directly to the PDF).</p><h3>Accepting &#8220;Good Enough&#8221; as &#8220;Enough&#8221;</h3><p>When it comes to creating something, is it okay to just throw ideas away? If you&#8217;re like me and don&#8217;t rely on creative outputs to pay the bills, then, sure, because it&#8217;s not the focus of my day-to-day work. I have the luxury of a steady job that pays the bills and keeps a roof over my head. But, if your livelihood depends on you both creating and <em>producing</em> something, there&#8217;s an inevitable compromise to be made between perfection and meeting the requirements of the moment.</p><div class="pullquote"><p>There&#8217;s an inevitable compromise to be made between perfection and meeting the requirements of the moment. </p></div><p>In tech, this has long been understood as a reality. <a href="https://www.agilealliance.org/glossary/mvp/">Minimum viable products</a> (MVPs), and minimum viable products <em>within</em> products, are everywhere, same as &#8220;just ship it&#8221; which is decreed constantly in various forms, ensuring that updates to code and new features get pushed to production. </p><p>While this kind of approach is rarely free from errors, often rife with them, the &#8220;just ship it&#8221; attitude is a true positive from the perspective of this Gladiator II recovery group that I&#8217;m holding here today. This path to releasing work into the wild helps to eliminate the barriers that come with perfectionistic tendencies, where you&#8217;re afraid to let go of something before it&#8217;s flawless. Once it&#8217;s been produced, imperfect as it may be, you have the opportunity to continually improve on the software, cultivating a cycle of <a href="https://www.coursera.org/articles/what-is-continuous-improvement">continuous improvement</a> while also bringing in new things over time. </p><p>It&#8217;s <em>not</em> perfect. And that&#8217;s the entire point.</p><p>This blog is not going to be perfect. For sure. Even though I hate the thought that there&#8217;s the potential for you to come across misspellings and whatnot, publishing this blog is my attempt to practice what I preach. To push my work out of the nest and into the world.</p><p>&#8220;Good enough&#8221; occurs all of the time in the creative arts, software development, and throughout life. Musicians have to release new music on a deadline or perform concerts even if every song isn&#8217;t up to par. Actors have to go on stage for specific performance dates, whether their lines are ready or not. I, as an amateur gardener may rehome a bush in the yard without guarantee that it will stay alive once I replant it (spoiler alert: the bush didn&#8217;t make it&#8212;it never makes it).</p><p>Once there is a commitment towards an idea, a path or plan of some kind is then laid out, leading to an end goal that is a deliverable <em>some</em>thing. Something must be produced. Similarly, sticking to a rigid schedule or expecting that all possible blemishes be removed is less important than actually delivering the product itself. </p><h1>Finding Success Through Imperfection</h1><p>Yes, there&#8217;s a natural fear that what you release is less than stellar, but the mere existence of faults does not mean that something is unsuccessful <em>because</em> of such faults. Charlotte Sidebotham <a href="https://pmc.ncbi.nlm.nih.gov/articles/PMC5565862/">expressed this mindset wonderfully</a>, &#8220;Good enough is not mediocrity, or merely good. <strong>It simply means that, at the current time, all things considered, there are sufficient benefits, and no critical problems.</strong>&#8221;</p><p>Now, I&#8217;d challenge the implication that Gladiator II &#8220;sufficiently benefits&#8221; anyone at all, but I shall restrain myself&#8230; from arguing with myself? </p><p>Oh well, moving on.</p><h3>What Drives Perfectionism</h3><p>While I am not the person people go to for firm definitions of psychological behaviors, I&#8217;m lucky to have a slew of Internet articles to help me grasp this topic more completely. One&#8217;s perfectionism can be driven by one or many factors. If this is something that you struggle with, I encourage you to share this with a <a href="https://www.psychologytoday.com/us/therapists">psychological professional</a> who can help you pinpoint potential root causes. </p><p>If someone says that they fight with perfectionism, please do not make assumptions about what may or may not influence those thoughts for them. Everyone&#8217;s experience is unique and deserves respect. I&#8217;ll only share findings here that have been found to be broadly applicable.</p><h3>External Validation</h3><p><a href="https://www.jmu.edu/counselingctr/self-help/perfectionism/index.shtml">Perfectionism</a> often stems from a yearning for external validation, a desire for others to affirm that what you&#8217;re doing is &#8220;good&#8221;. This is something that many people may be able to relate to. </p><p>You&#8217;re seeking external validation whenever thought patterns consistently guide you towards imagining what others may expect from you, likely outweighing the confidence you have in yourself and your work. You could seek validation from specific people in your life or career, or be fearful of validation from a more general, undefined &#8220;other&#8221;. </p><p>Tech companies are not immune to this, nor is any company. Companies are made up of groups of humans, with each one of those humans carrying the burden of their own psychological baggage, regardless of the size of that burden. All teams are made up of individuals and, mostly, teams rely on the approval and guidance of a single leader. Those leaders are <em>also</em> humans themselves (I promise) and who are likewise vulnerable to this mental self-trickery.</p><p>Have you ever:</p><ul><li><p>Feared what your boss or manager will think of your work?</p></li><li><p>Been wary of showing others what you&#8217;re working on, afraid of what they&#8217;ll think?</p></li><li><p>Felt that you didn&#8217;t know enough to share your knowledge with others?</p></li><li><p>Written an email, deleted it, only to write it again and painstakingly read and reread it until it&#8217;s artisanally sculpted to the finest level of quality, even though it was just you replying in kind to a teammate?</p></li></ul><p>Congratulations, you are <strong>normal</strong>. We&#8217;re proud to count you amongst us.</p><p>Having these thoughts and/or thinking you tend to lean towards perfectionism does <em>not</em> mean that there is anything wrong with you. Not in the slightest. Myself, for example, is sitting here wondering (and worrying a bit) about what people will think of what I&#8217;m writing in this post. Recognizing this about myself does not automatically equip me with the ability to work healthily with these feelings, but I feel like it helps for me to <em>accept</em> that these feelings exist and to move forward from there.</p><h1>Security is Never Perfect</h1><p>This is a security-related blog after all, isn&#8217;t it?</p><p>If you&#8217;re not in tech or not a security professional, think about a time when you purchased a piece of software, or bought a video game, or watched a live stream where something went wrong. Maybe the software was buggy, or the game graphics were glitchy (I&#8217;m thinking of you, <a href="https://www.nytimes.com/2020/12/19/style/cyberpunk-2077-video-game-disaster.html">Cyberpunk 2077</a>), or the live stream&#8217;s quality of service resulted in a pixelated mess or lack of a stream at all (<a href="https://www.npr.org/2024/11/21/nx-s1-5198106/is-video-streaming-infrastructure-up-to-par">Netflix&#8217;s recent boxing spectacle</a>, for example). </p><p>If you&#8217;re thinking about something in the time of the Internet era, then patches were likely (hopefully) released for that software, updates were pushed to that game to improve performance, and we&#8217;ll say that the live stream company learned from their mistakes and beefed up their infrastructure for better streams down the road.</p><p>For many people in tech, regardless of role, they understand that imperfections are just part of the game. You&#8217;re constantly making adjustments to upcoming software releases, product roadmaps, and business opportunities. At best, you catch the imperfections yourself and take action, at worst, you put out fires from customers with issues or from troublesome actors who target vulnerabilities. Whether proactive or reactive, working in tech demands agility.</p><p>Security is never perfect and perfect security doesn&#8217;t exist. I don&#8217;t say this as a cheap grab for attention. This is just the nature of the beast. We&#8217;re only able to secure what we know exists <em>to</em> secure and can only provide security to a level possible by those implementing the security measures.</p><div class="pullquote"><p><strong>Security is never perfect and perfect security doesn&#8217;t exist.</strong></p></div><p>Out-of-the-box tooling is available to help you and I gain visibility over our environments, receive alerts regarding misconfigurations or undesired activity, and actively manage endpoints. Security professionals, in turn, learn to analyze tool output effectively, identifying anomalous activities that warrant attention, pinpointing errors in code that might present security concerns, and providing steadfast response to incidents of all shapes and sizes.</p><p>Think:</p><ul><li><p>What security tool is &#8220;perfect&#8221; at what it aims to do? </p></li><li><p>What security professional or team of security professionals is &#8220;perfect&#8221; at what they do? </p></li><li><p>Does a definition for &#8220;perfect&#8221; security exist?</p></li></ul><h3>Imperfect Security is Security</h3><p>When I was studying choral conducting some years ago, our professor used to always share a bit of wisdom with us, &#8220;Music demands perfection while simultaneously denying it.&#8221; (he would always repeat this about three times whenever he said it) </p><p>He would then go on to explain how, even with the most diligent practice, there was always the possibility of imperfections in music. One person in the choir could mispronounce a word (you&#8217;d be amazed at the power of a single person singing a loud &#8220;s&#8221; in the wrong place), a pianist&#8217;s finger could slip to the wrong key, the air temperature could be too high and make the performers uncomfortable on stage - anything. That was his point. You work so hard to present a polished, perfected work of art to an audience, yet, no matter how hard you try, imperfections have the chance to pop up at any moment. </p><p>But, here I am thinking that this phrase applies <em>perfectly</em> to security: Security demands perfection while simultaneously denying it. This is a profound realization for me, how, regardless of effort, collective expertise, or the capabilities of tools we deploy, there will always be room for us to improve the security measures we put in place.</p><div class="pullquote"><p><strong>Security demands perfection while simultaneously denying it.</strong></p></div><p>The owner of a company I used to work for would hold daily meetings each morning. It was a small company, so he would huddle each day with us to hear updates and to help think of ways to solve customer issues, production issues, or general business issues. He used to say that any problem boils down to one of three things. Years later, I&#8217;ve found these three things apply beautifully when identifying root causes to security issues:</p><ol><li><p><strong>Human error</strong></p><ol><li><p>Human error can account for an incredible range of security issues. Actions could be intentional, unintentional, or could be intentinonal acts manipulated through the influence of bad actors.</p></li><li><p>I&#8217;m happy to follow many professionals who lead and conduct research in this burgeoning &#8220;human factors&#8221; segment of security. This area goes well beyond simple security awareness efforts.</p></li></ol></li><li><p><strong>Process error</strong></p><ol><li><p>Did the SDLC process not identify the vulnerability in time before release? How come the IT team didn&#8217;t escalate that incident more quickly? Why do we have more than one process we&#8217;re following for incident response?</p></li><li><p>Here, the root cause boils down to a lack of detail or foresight within in the process itself. Fixing the process immediately helps to mitigate future, similar instances from occurring again.</p></li></ol></li><li><p><strong>Machine error</strong></p><ol><li><p>This could be any number of issues that stem from an endpoint of any kind. Misconfigurations, outdated software or operating systems, hardware malfunctions, etc. There are tons of possibilities.</p></li><li><p>Some of these errors can happen through simple &#8220;wear-and-tear&#8221; of a device, where things can be repaired or replaced in whole. Or, some errors are possible to fix with sufficient visibility and healthy processes to identify issues in advance..</p></li></ol></li></ol><p>No one can claim to have a crystal ball, so no one can claim that they have foreseen all possible security issues both now and in the future. Since no one can see this future, no one can protect against everything that might happen to those you&#8217;re trying to protect.</p><p>While it&#8217;s unhealthy and unwise to demand that security be perfect, it is healthy to expect that security be as strong as possible given the budget, skills, and tools that are available. </p><p>Because security is constantly imperfect, we must continually work to stay informed, stay aware, and keep ourselves educated on emerging threats. As my mother used to say, &#8220;You do with best you can with what you&#8217;ve got.&#8221; In security, we do that all the time, don&#8217;t we? Here, doing your best directly involves action, motion, taking steps forward. Notice how &#8220;your best&#8221; has nothing to do with perfection itself. </p><blockquote><p>Think of &#8220;The 5 P&#8217;s&#8221;<strong>: Proper Practice Prevents Poor Performance</strong>.</p></blockquote><p>Imperfect security is <em>still</em> security, since that is the only kind of security that we know. And that&#8217;s okay. What&#8217;s not okay is to fail to take action because you don&#8217;t have a perfect solution on-hand, or you haven&#8217;t published a fully-formed process/policy. </p><p>Take steps forward now and improve as you go. A small protection now can be made more robust and more effective over time, iteration by iteration.</p><p>Constantly <em>im</em>-perfect, you say? </p><p>Perfect. That means we&#8217;ll always have room to improve.</p><h1>The Bottom Line</h1><p>When all else fails, when you find yourself down and out, when you are struggling to see that you belong in security, when you don&#8217;t see yourself creating anything that&#8217;s good enough for yourself, let alone perfect for someone else, remember&#8212;someone, somewhere, believed in Gladiator II. Someone, somewhere, said, &#8220;That&#8217;s good enough,&#8221; and released it to theaters, even if they thought it wasn&#8217;t the best film they had ever made.</p><p>So if Gladiator II can make it, so can you. Literally anything is possible. </p><p></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://heroicpanda.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Security for the Rest of Us is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Me vs. The CISSP — A Battle Story]]></title><description><![CDATA[Late winter clung to the delicate afternoon air, pulled away gently by the sun that shone bright. I cast my gaze upward, surveying the&#8230;]]></description><link>https://heroicpanda.com/p/me-vs-the-cissp-a-battle-story-7b423d9c1835</link><guid isPermaLink="false">https://heroicpanda.com/p/me-vs-the-cissp-a-battle-story-7b423d9c1835</guid><dc:creator><![CDATA[Nathan Walker]]></dc:creator><pubDate>Thu, 07 Mar 2024 14:09:29 GMT</pubDate><enclosure url="https://substackcdn.com/image/youtube/w_728,c_limit/I-YYZiJvwpc" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><div id="youtube2-I-YYZiJvwpc" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;I-YYZiJvwpc&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/I-YYZiJvwpc?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><figcaption class="image-caption">Play this music for the ultimate reading experience (and to distract from my writing abilities)</figcaption></figure></div><p>Late winter clung to the delicate afternoon air, pulled away gently by the sun that shone bright. I cast my gaze upward, surveying the heavens for any clues as to my fate. No luck. The sky hides my fortune.</p><p>Fine by me. I will forge my own destiny on this day. I lower my gaze and continue on.</p><p><em>Steady.</em></p><p>This day, which may seem to be but any other day, was far, far away from any other day, for this was the day that I had chosen for battle. This was the day I had been training for, been steeling myself for, been steadily readying myself for, knowing the fight that lay ahead. This day was <em>that</em> day, the day for victory.</p><p>I continue towards the battlefield, eyes front, stalwart, unyielding. Sweat teases down my brow and along my back, either from the rising intensity building within my soul or from the heavy sweatshirt I was wearing. Who knows.</p><p><em>Steady.</em></p><p>&#8220;Focus,&#8221; I tell myself, eyes narrowing. &#8220;Focus.&#8221;</p><p>As I approach, closer and closer, I am already waging war with the beasts that lay within. Each quickening pulse brings a stab of fear, a prick of doubt, a seeming torrent of piercing anxiety. My mind parries each ambush of distractions as my body drives me closer, knowing that my wits are occupied. I tighten my grip on the wheel and guide my chariot forward. Forward to where I will taste my triumph.</p><p><em>Steady.</em></p><p>The fortress begins to grow out of the horizon. I can see it probing my soul, taunting me to encroach upon its hallowed ground, to dare and try to succeed. I meet its stare, in, like, a really cool way.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!2EDu!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc784a432-185d-473e-9c7a-86ea3e61b800_800x166.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!2EDu!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc784a432-185d-473e-9c7a-86ea3e61b800_800x166.png 424w, https://substackcdn.com/image/fetch/$s_!2EDu!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc784a432-185d-473e-9c7a-86ea3e61b800_800x166.png 848w, https://substackcdn.com/image/fetch/$s_!2EDu!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc784a432-185d-473e-9c7a-86ea3e61b800_800x166.png 1272w, https://substackcdn.com/image/fetch/$s_!2EDu!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc784a432-185d-473e-9c7a-86ea3e61b800_800x166.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!2EDu!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc784a432-185d-473e-9c7a-86ea3e61b800_800x166.png" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c784a432-185d-473e-9c7a-86ea3e61b800_800x166.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:null,&quot;width&quot;:null,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!2EDu!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc784a432-185d-473e-9c7a-86ea3e61b800_800x166.png 424w, https://substackcdn.com/image/fetch/$s_!2EDu!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc784a432-185d-473e-9c7a-86ea3e61b800_800x166.png 848w, https://substackcdn.com/image/fetch/$s_!2EDu!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc784a432-185d-473e-9c7a-86ea3e61b800_800x166.png 1272w, https://substackcdn.com/image/fetch/$s_!2EDu!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc784a432-185d-473e-9c7a-86ea3e61b800_800x166.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a><figcaption class="image-caption">Totally how I look when I stare at&nbsp;people</figcaption></figure></div><p>&#8220;You won&#8217;t scare me. Not today,&#8221; I whisper into the ether, moving closer. The building seems unphased by my words, growing only more colossal with each second.</p><p><em>Steady.</em></p><p>I&#8217;m here. As soon as I cross the threshold, I know there&#8217;s no going back.</p><p>My hands, somewhat clammy, betray the forest of nerves I hide within. I grip my car door. My brain, electrified in nervous thought, cries out for reassurance. My heart, though resolute, pounds through my chest. Training has prepared me to face this moment, and I was ready to fell the beast, to slay the foe, to emerge as victor.</p><p>Courage lies not in the absence of fear, but in <em>spite</em> of fear. I take one long, steadying breath, open my door, and march into the fray.</p><p><em>Ready.</em></p><h3>Why I&#8217;m Writing&nbsp;This</h3><p>Don&#8217;t worry, this whole post won&#8217;t be written like that! Even though it did feel like a battle, and, yes, even though I did wear a sweatshirt that was way too warm for the day, I felt really prepared come exam time. Now that I&#8217;ve passed the exam on my first try, I wanted to take some time to organize my thoughts, hopefully in a way that others find useful.</p><p>The CISSP is world-renowned as a security certification, so there is no shortage of websites, trainings, books, and YouTube videos. However, information about how to jump into studying and best prepare yourself is scattered and I know I had to take a long time just to develop a strategy for how to approach this beast.</p><p>Overall, my goal is to share my approach for preparing for the CISSP exam. I didn&#8217;t take any expensive trainings, I simply studied hard on my own time and drew upon my experiences in IT and security (experience I gained since changing careers back in 2016).</p><p>Here&#8217;s what I&#8217;ll cover:</p><ul><li><p><strong>Bracing for Battle: My Studying Journey&#8202;</strong>&#8212;&#8202;my approach, how I had a plan(-ish), my struggles</p></li><li><p><strong>Weapons of Wit: My Study Resources</strong>&#8202;&#8212;&#8202;breakdown of what was helpful and everything I used</p></li><li><p><strong>Battlefield Brawl: My Exam Experience&#8202;&#8212;&#8202;</strong>the testing center, how I felt going in, my feelings during the test, etc.</p></li><li><p><strong>Post-Clash Clarity: Tips, Takeaways and Advice</strong>&#8212; the lessons learned post-exam; mostly me pretending that I know how to relay wisdom effectively</p></li></ul><p>I&#8217;ll assume that you are already aware of the CISSP exam and what it entails. If you&#8217;re not familiar with the exam, I&#8217;d encourage you to start with the official <a href="https://www.isc2.org/certifications/cissp">ISC2 site</a> and branch out from there.</p><p>And, okay, maybe I&#8217;ll pepper in a dose or two of dramatism just for the hell of it because it&#8217;s fun to write. Those sections will be marked with the giant capital letter thingy at the start of the paragraph, with dividers in the text, in case you&#8217;d prefer to skip. I&#8217;ll only be slightly offended.</p><h3>Bracing for Battle: My Studying&nbsp;Journey</h3><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!mhLI!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F59580560-14e0-47f7-a89d-6f8610855481_800x640.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!mhLI!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F59580560-14e0-47f7-a89d-6f8610855481_800x640.jpeg 424w, https://substackcdn.com/image/fetch/$s_!mhLI!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F59580560-14e0-47f7-a89d-6f8610855481_800x640.jpeg 848w, https://substackcdn.com/image/fetch/$s_!mhLI!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F59580560-14e0-47f7-a89d-6f8610855481_800x640.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!mhLI!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F59580560-14e0-47f7-a89d-6f8610855481_800x640.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!mhLI!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F59580560-14e0-47f7-a89d-6f8610855481_800x640.jpeg" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/59580560-14e0-47f7-a89d-6f8610855481_800x640.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:null,&quot;width&quot;:null,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!mhLI!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F59580560-14e0-47f7-a89d-6f8610855481_800x640.jpeg 424w, https://substackcdn.com/image/fetch/$s_!mhLI!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F59580560-14e0-47f7-a89d-6f8610855481_800x640.jpeg 848w, https://substackcdn.com/image/fetch/$s_!mhLI!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F59580560-14e0-47f7-a89d-6f8610855481_800x640.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!mhLI!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F59580560-14e0-47f7-a89d-6f8610855481_800x640.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a><figcaption class="image-caption">Photo by <a href="https://unsplash.com/@birkenwald?utm_source=medium&amp;utm_medium=referral">Birk Enwald</a> on&nbsp;<a href="https://unsplash.com?utm_source=medium&amp;utm_medium=referral">Unsplash</a></figcaption></figure></div><p>No certification undertaking is a small commitment because every commitment in this realm involves resources and sacrifice. Putting aside the cost of study materials and exam fees, <strong>the biggest commitment you make is</strong> <strong>always that of your time. </strong>With time being your most finite resource at any given moment on any given day, how you choose to devote your time is important.</p><p>&#8220;Well, Nathan, why did <em>you</em> take the CISSP?,&#8221; you may wonder.</p><p>For me, the Black Hat USA 2023 conference last year was my inflection point. Throughout 2023 I had been searching for a personal development goal and had thought about the CISSP a bit here and there. But, being at Black Hat, surrounded by multitudes of dedicated professionals and exciting tech, I decided to jump in and commit myself once and for all. If I was going to excel at this whole security deal, I shouldn&#8217;t wait for anyone to create the opportunity for me. I wanted to set a goal and see it through.</p><p>I&#8217;m fortunate enough to work for a company that is supportive but not prescriptive when it comes to personal development, which I treasure. I chose the CISSP to kind of kick my butt a little bit and to re-energize my study habits in general.</p><p>I&#8217;m of the feeling that everyone should be able to explain exactly <em>why </em>they are pursuing a specific effort, especially for certifications. I&#8217;ve learned, through personal experience and that of friends and coworkers, most people get certifications for the following reasons:</p><ul><li><p><strong>Make a case for</strong> <strong>promotion</strong>&#8202;&#8212;&#8202;Certifications, in the correct work setting, can help people make their case for career advancement</p></li><li><p><strong>Make a case for</strong> <strong>that next job&#8202;&#8212;&#8202;</strong>positions they are applying for or will apply for</p></li><li><p><strong>It&#8217;s required</strong> (in federal government and military scenarios, for example)</p></li><li><p><strong>Personal development</strong>&#8202;&#8212;&#8202;Certifications may not be required, but they use them to upskill and as a means of continuous learning</p></li></ul><p>I will always support people who choose to get certified in whatever way, however I will also always tell people to ask themselves, (1) &#8220;<strong>Is this certification absolutely required for my current position, or the position that I want?</strong>,&#8221; (2) &#8220;<strong>Does this certification align with my goals? </strong>Will it put me on track for success or distract from what I really want?&#8221;, and (3) &#8220;<strong>Is this certification going to be the </strong><em><strong>best</strong></em><strong> use of my time, energy, and money?</strong>&#8221;</p><blockquote><p>Spend your time, energy, and money&nbsp;wisely!</p></blockquote><p>Spend your time, energy, and money wisely! Most people that I know are not blessed with endless wealth (myself included [<em>insert crying face here</em>]), and, money aside, most people I know have families and partners that they help provide for. You should consider the impact that your studying commitment and your spending on materials will have on your finances, your mental health, and your relationships. There will always be an impact, even if that impact is as small as robbing you of your free time. Taking time to consider these factors will leave you better prepared for when unforeseen stressors pop out at you at the least opportune time.</p><p>On the whole, my study journey lasted about six months in total, though most of that time I was not studying seriously. Only the last two months were heavily focused and disciplined, where I was studying each day. Here&#8217;s a breakdown of my study process in those two months.</p><p>If my study time was a deep dish pizza, I&#8217;d say it felt like 7 out of 8 slices were devoted to highlighting the entire OSG. And I do mean the entire thing! This was possibly the most mind numbing experience of my life, yet it turned out to be a great way for me to work through the study material.</p><p>To take breaks from highlighting, I started pouring flashcards into Quizlet. No kidding, I&#8217;m pretty sure I created thousands of them&nbsp;when&nbsp;all&nbsp;was&nbsp;said&nbsp;and&nbsp;done. Quizlet has been my study buddy ever since getting my CompTIA A+ years ago, so it&#8217;s my go-to when there&#8217;s a need to study. I&#8217;d flip through flashcards on my laptop and almost every night in bed on my phone. Did I use all the flashcards I created? Definitely not. They were still very helpful to have at the ready.</p><p>This process of reading and skimming over flashcards and material I&#8217;d read previously lasted for about 1&#8211;1/2 months. Then, for the final two weeks, I focused on drilling practice exams and study questions. I would do one LearnZApp practice exam each day, review any missed questions, and began working through the domain-specific questions (in the book of official practice exams) for the domains where I struggled. I&#8217;d always prioritize domains where the LearnZApp indicated areas of weakness. I never got below 70% on any practice exams or chunks of domain-specific questions,&nbsp;did&nbsp;better&nbsp;one&nbsp;some&nbsp;exams,&nbsp;and&nbsp;barely&nbsp;passed&nbsp;on&nbsp;at&nbsp;least&nbsp;one. This helped build my confidence that my study plan was working and I was going to be ready come exam time.</p><blockquote><p>Treating my CISSP studying like practicing piano really helped reframe things for&nbsp;me</p></blockquote><p>When you practice piano, you always have the &#8220;not fun&#8221; things that are fundamental for any pianist and a part of your daily routine. For example, major/minor scales aren&#8217;t exactly the sexiest thing you can play for your friends at parties,&nbsp;but&nbsp;they&#8217;re&nbsp;crucial&nbsp;for&nbsp;skills&nbsp;development. Finger exercises, scales, and arpeggios, among others, are just something that you know you <em>have</em> to do, that you <em>should</em> do, in order to build up your skills holistically.</p><p>Studying frequently felt like a punishment, let&#8217;s be real. Sometimes I felt like I was really into the material, sure, but more often than not it was like when you&#8217;re a kid and your Mom forces you to eat your vegetables. You don&#8217;t want to do it even if you know it&#8217;s good for you. Since my Mom wasn&#8217;t here to make me eat my CISSP vegetables, <strong>I shifted my approach to studying from thinking about it simply as </strong><em><strong>reading</strong></em><strong> to the more involved mindset of </strong><em><strong>practicing</strong></em>. Flashcards were my new piano scales and reading study guides was like me learning a piano piece for the first time. Slow, intentional, methodical practice, chunking out material, and supplementing with other sources when needed, all with the goal of absorbing the material and making it stick.</p><p>I&#8217;m no wizard of discipline! Not in the slightest. Yet, the discipline I do have propelled me to get <em>some</em> studying done on the tough days. There will be days where you&#8217;ve had a long day at work. There will be days where things at home distract you, both good and bad. There will be days where studying is the last thing you want to do and you might even feel like you truly can&#8217;t study.</p><p>A piece of advice I heard from a professional bodybuilder, of all people:</p><blockquote><p><strong>&#8220;Remember the Five P&#8217;s: Proper Practice Prevents Poor Performance.&#8221;</strong></p></blockquote><p>It&#8217;s not &#8220;perfect&#8221; practice&#8202;&#8212;&#8202;not at all. Get perfection out of your head and forget about it. Remember that while your goal is to learn as much as you can, chasing perfection isn&#8217;t what will earn you your CISSP, but that 70% mark (that&#8217;s common for most certifications). All you need to do is demonstrate 70% proficiency on the exam. While I passed at 125 questions, my passing score is exactly the same as someone who passed at 175 questions. What&#8217;s cool is that it doesn&#8217;t matter! If you pass, you never even see your grade anyhow. Any two CISSPs will be the same because no one knows their actual score.</p><p>My advice is to go into your studies with the mindset that you&#8217;re practicing, not simply reading. Establish a routine of building the fundamentals and the discipline will build over time. Then, when motivation falters (because it will&#8202;&#8212;&#8202;motivation is not permanent) you&#8217;ll have your discipline to fall back on.</p><p>If you&#8217;re like me and the word &#8220;studying&#8221; can give you the willies, check out this free Coursera course, <a href="https://www.coursera.org/learn/learning-how-to-learn">Learning How to Learn</a>.</p><h3>Weapons of Wit: My Study Resources</h3><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!ZFFj!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ebeb60f-d729-4947-92a4-40d6954051a9_800x526.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ZFFj!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ebeb60f-d729-4947-92a4-40d6954051a9_800x526.jpeg 424w, https://substackcdn.com/image/fetch/$s_!ZFFj!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ebeb60f-d729-4947-92a4-40d6954051a9_800x526.jpeg 848w, https://substackcdn.com/image/fetch/$s_!ZFFj!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ebeb60f-d729-4947-92a4-40d6954051a9_800x526.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!ZFFj!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ebeb60f-d729-4947-92a4-40d6954051a9_800x526.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ZFFj!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ebeb60f-d729-4947-92a4-40d6954051a9_800x526.jpeg" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/6ebeb60f-d729-4947-92a4-40d6954051a9_800x526.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:null,&quot;width&quot;:null,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!ZFFj!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ebeb60f-d729-4947-92a4-40d6954051a9_800x526.jpeg 424w, https://substackcdn.com/image/fetch/$s_!ZFFj!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ebeb60f-d729-4947-92a4-40d6954051a9_800x526.jpeg 848w, https://substackcdn.com/image/fetch/$s_!ZFFj!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ebeb60f-d729-4947-92a4-40d6954051a9_800x526.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!ZFFj!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ebeb60f-d729-4947-92a4-40d6954051a9_800x526.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a><figcaption class="image-caption">A brilliant way to hide your sobbing as you trudge through your studies. Photo by <a href="https://unsplash.com/@siora18?utm_source=medium&amp;utm_medium=referral">Siora Photography</a> on&nbsp;<a href="https://unsplash.com?utm_source=medium&amp;utm_medium=referral">Unsplash</a></figcaption></figure></div><p>I remember what it felt like to receive that first CISSP study guide in the mail. I&#8217;d used the McGraw Hill &#8220;all-in-one&#8221; training guides in the past, so I went ahead and ordered the <a href="https://www.amazon.com/CISSP-All-One-Guide-Ninth-dp-1260467376/dp/1260467376/ref=dp_ob_title_bk">CISSP All-in-one</a>, too. When I received it and realized how monstrous of a book it was, <em>that&#8217;s</em> when it finally hit me just how much knowledge I&#8217;d be expected to know when I sat for the exam. It was intimidating, if I&#8217;m honest.</p><p>In hindsight, it wasn&#8217;t so much the sheer amount of material to be covered alone, but the combination of that plus a <em>fear of the unknown</em> type of deal. I was diving into a certification effort that was wholly new and looking to learn while also earning a credential that carries a lot of weight.</p><p>To help address that fear of the unknown, I Googled like I had never Googled before:</p><ul><li><p>I looked up the official <a href="https://www.isc2.org/certifications/cissp">CISSP site on ISC2</a>, pulled down copies of the objectives, read about the <a href="https://www.isc2.org/certifications/cissp/cissp-cat">Computerized Adaptive Testing (CAT) system</a>, and everything else they offered about the exam and what the exam covered.</p></li><li><p>I dove into Reddit. Reddit can be a wild place, but it has a vibrant CISSP subreddit, <a href="https://www.reddit.com/r/cissp/">r/cissp</a>, where tons of Redditors have shared their stories of success and failure. Not every post is created equal here and the advice from post to post may conflict, but <a href="https://www.reddit.com/r/cissp/comments/xdgvju/passed_the_cissp_exam_125_questions_2_hours/">some of them were tremendously helpful</a>. I can&#8217;t stress enough how helpful this subreddit was to my preparations (and encourage you to exercise due diligence whenever accepting a stranger&#8217;s advice regarding study practices). Active members within the subreddit are very supportive of one another.</p></li><li><p>Using different sources, including Amazon/book site reviews, I settled on study resources that I thought would help (full list below).</p></li></ul><p>Speaking of study resources, I bought that McGraw Hill All-in-one shortly after Black Hat. After I started reading that CISSP All-in-one book, though, I quickly began to wonder about my study strategy.</p><blockquote><p><em>&#8220;I should start with the official study guide, if anything,&#8221; </em>I thought to&nbsp;myself.</p></blockquote><p>I decided to buy the <a href="https://www.amazon.com/Certified-Information-Security-Professional-Official/dp/1119790026/ref=pd_lpo_sccl_2/131-3801944-3784832?pd_rd_w=GIExD&amp;content-id=amzn1.sym.1ad2066f-97d2-4731-9356-36b3edf1ae04&amp;pf_rd_p=1ad2066f-97d2-4731-9356-36b3edf1ae04&amp;pf_rd_r=EXH9PA566M3FC09VS7XJ&amp;pd_rd_wg=SUD4D&amp;pd_rd_r=2fa4f123-5741-4a05-923b-63055e6bef91&amp;pd_rd_i=1119790026&amp;psc=1">official CISSP study and the official practice exams</a> (&lt;$50 USD at the time). I&#8217;d focus on the Official Study Guide (OSG) and use that as my study Bible, my source of truth. Any conflicting information anywhere else would be disregarded and I&#8217;d always default to the OSG. For practice exams, I would rely on the official practice exams book to gauge the style and difficulty level of questions I may encounter come exam time. Anything else would supplement those sources of truth. Thus began the steady purchasing of materials throughout the fall of 2023.</p><p>Here&#8217;s a list of all study resources I obtained (paid resources marked with $):</p><ul><li><p><a href="https://www.amazon.com/CISSP-All-One-Guide-Ninth/dp/1260467376/ref=pd_bxgy_img_d_sccl_1/131-3801944-3784832?pd_rd_w=h9BiD&amp;content-id=amzn1.sym.2b132e63-5dcd-4ba1-be9f-9e044543d59f&amp;pf_rd_p=2b132e63-5dcd-4ba1-be9f-9e044543d59f&amp;pf_rd_r=KA7522JASZ21YGSKJY03&amp;pd_rd_wg=ytMMp&amp;pd_rd_r=47e60b4a-261e-43e2-bf8c-bcd350417880&amp;pd_rd_i=1260467376&amp;psc=1">CISSP All-in-One Exam Guide, Ninth Edition</a> $</p></li><li><p><a href="https://www.cybrary.it/course/cissp">Cybrary&#8202;&#8212;&#8202;Kelly Handerhan&#8217;s CISSP Course</a> $$ (she is the BEST, I love her explanations)</p></li><li><p><a href="https://www.amazon.com/Certified-Information-Security-Professional-Official/dp/1119790026/ref=pd_lpo_sccl_2/131-3801944-3784832?pd_rd_w=GIExD&amp;content-id=amzn1.sym.1ad2066f-97d2-4731-9356-36b3edf1ae04&amp;pf_rd_p=1ad2066f-97d2-4731-9356-36b3edf1ae04&amp;pf_rd_r=EXH9PA566M3FC09VS7XJ&amp;pd_rd_wg=SUD4D&amp;pd_rd_r=2fa4f123-5741-4a05-923b-63055e6bef91&amp;pd_rd_i=1119790026&amp;psc=1">(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide &amp; Practice Tests Bundle</a> $</p></li><li><p>Destination Certification&#8217;s <a href="https://www.amazon.com/Destination-CISSP-Concise-Rob-Witcher/dp/B0BT1Y6DYL/ref=pd_sim_hxwPM1_sspa_dk_detail_p5_og_dN?pd_rd_w=YSSf1&amp;content-id=amzn1.sym.41d9180b-a439-4c27-808c-98db8d46673c&amp;pf_rd_p=41d9180b-a439-4c27-808c-98db8d46673c&amp;pf_rd_r=KA7522JASZ21YGSKJY03&amp;pd_rd_wg=ytMMp&amp;pd_rd_r=47e60b4a-261e-43e2-bf8c-bcd350417880&amp;pd_rd_i=B0BT1Y6DYL">Destination CISSP: A Concise Guide</a> $ (don&#8217;t let the name fool you, it&#8217;s a large, beautiful textbook; another excellent resource)</p></li><li><p>Thor Teaches&#8202;&#8212;&#8202;<a href="https://cart.thorteaches.com/cissp/">CISSP by Thor Pederson</a> $$$ (can buy on his website, or individually through <a href="https://www.udemy.com/user/thorpedersen/">Udemy</a>, I personally did Udemy)</p></li><li><p>Thor Teaches&#8202;&#8212;&#8202;<a href="https://cart.thorteaches.com/cissp-questions/">ALL CISSP questions by Thor + Boson</a> $$$</p></li><li><p>Pete Zerger&#8217;s <a href="https://www.youtube.com/watch?v=_nyZhYnCNLA">CISSP Exam Cram Full Course on YouTube</a> (crazily helpful video)</p></li><li><p>Kelly Handerhan&#8217;s <a href="https://www.youtube.com/watch?v=v2Y6Zog8h2A">Why you will pass the CISSP on YouTube</a> (to be watched close to exam time)</p></li><li><p>Wiley&#8202;&#8212;&#8202;free online study questions and flashcards (simply register following the process in the OSG)</p></li><li><p><a href="https://learnzapp.com/apps/cissp/">LearnZApp</a> $ (mobile/desktop app)</p></li><li><p>Luke Ahmed&#8217;s <a href="https://www.amazon.com/Think-Like-Manager-CISSP-Exam/dp/1735085197">How to Think Like a Manager for the CISSP Exam</a> $</p></li><li><p>Mike Chapple&#8217;s Linkedin Learning CISSP courses $ (this was free, thanks to my library card&#8202;&#8212;&#8202;you should look to see if your local library offers something similar)</p></li><li><p>Mike Chapple&#8217;s <a href="https://transactions.sendowl.com/products/78699615/EC3C7090/view">One-time Practice Exam</a> $</p></li><li><p>Mike Chapple&#8217;s <a href="https://transactions.sendowl.com/products/78140440/EBC002CE/view">CISSP Last Minute Review Guide</a> $</p></li><li><p><a href="https://www.amazon.com/Official-ISC-CISSP-CBK-Reference/dp/1119789990">The Official (ISC)2 CISSP CBK Reference</a> $</p></li></ul><p>Now, everything above is hundreds of dollars in total. Trust me, I am definitely <em>not</em> rich. For me, the idea is that online reviews are one thing, but I want to see something for myself; dip my toes in the water of each resource and deem it useful or not.</p><p>By the way, it&#8217;s also important to note that I did <em>not</em> find all of these resources useful. And no, my list above is not a comprehensive list of all the good resources available,&nbsp;either. I&#8217;ll share more on that later when I get into the lessons learned.</p><div class="captioned-image-container"><figure><div id="youtube2-7BBswrsljX0" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;7BBswrsljX0&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/7BBswrsljX0?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div></figure></div><p>My pulse, accelerating. My mouth, dry with anxiety. My muscles, tense, galvanized for action. My mind, honed, sharp, and ready. My ears, oddly sweaty from the noise-blocking headphones. The battle is on. No going back now.</p><p><em>Focus.</em></p><p>Thoughts of doubt, lying in wait, leap at my concentration from the shadows. The armor of preparation holds fast. Their attack, hellbent on my derailment, is unceasing, testing my defenses at every turn.</p><p><em>Click</em>. Easy question&#8202;&#8212;&#8202;I parry the blow. &#8220;Nice try, CISSP,&#8221; I say with a smirk. <em>Click. </em>Another easy one.</p><p><em>Click. Click, click. Clickclickclickclick. </em>I wiggle my mouse with a hushed, frustrated fury, clicking on emptiness all over the screen as the question before me evades my understanding. My opponent fights valiantly, earning my respect.</p><p>The monitor in front of me is my battlefield on this day, my mouse, my sword. Staring ahead I see only a minefield of logical snares, clever traps of comprehension, hidden, ready to strike, waiting for my misstep within its interface. &#8220;Not today&#8230;&#8221;<em>, </em>I tell myself.</p><p><em>Focus.</em></p><p>Each question, a wave of attack. My enemy is deft of hand and keen of strategy. I counter a weak strike yet soon suffer wounds from the next, poisoning my concentration with fear. <em>They are too strong&#8230; There&#8217;s too many of them. </em>This fight was testing my strength.</p><p>Training instilled in me the goal of 125 foes. 125 conquered enemies must fall before I may taste victory, or feel the pangs of defeat. Yet, I knew that up to 175 attacks may be launched before this battle was through.</p><p>I tighten my grip on the mouse and repeat the mantra that has seen me through before. I will not be defeated&#8230;</p><p><em>Focus!</em></p><h3>On the Battlefield: My Exam Experience</h3><p>I, like many of you, I&#8217;m sure, fight back imposter syndrome more often than I may care to admit. And while people talk more openly about their failures&nbsp;than&nbsp;they&nbsp;may&nbsp;have&nbsp;in&nbsp;past&nbsp;decades, the fear of failure is still a powerful force. While studying, I&#8217;d be lying if I said I wasn&#8217;t worried about failing. That kind of fear is, unfortunately, a thing, but it&#8217;s something that many people can empathize with.</p><p>The best thing I did to combat those feelings was to practice and prepare. That way, when I walked into Pearson Vue, I would know that I was ready.</p><p>My experience at the Pearson Vue testing center was quite pleasant. The facilities were clean, the staff was friendly and professional, and the testing area itself was nice and quiet. If you&#8217;ve never been to a Pearson Vue testing center, you should go and simply ask for a brief tour. At worst, they may say, &#8220;No,&#8221; but at best you will get a chance to see where you will be taking your exam.</p><p>On the day of your exam, I&#8217;d recommend that you:</p><ul><li><p><strong>Arrive at least 30 minutes early</strong>. This allows plenty of time for you to use the restroom, handle the paperwork, and take care of other security measures. This alleviates any stress which could come with being in a rush.</p></li><li><p><strong>Eat filling, healthy meals and mind your liquids. </strong>You are able to take breaks during the four hours of the exam, but you do so at the cost of your total time. The clock will not stop, so mind your caffeine and liquid intake, and, if possible, try to go into the exam fueled with a good meal a reasonable amount of time beforehand.</p></li><li><p><strong>Pause and take a minute or two to collect your thoughts before going in. </strong>You may very well feel nervous and anxious. Taking a second to experience the calming effect of a few deep breaths and introducing some reassuring thoughts into the mix might help you enter the testing center in a healthier mental state for excellence.</p></li></ul><p>For the test itself, they had a pair of these gigantic, noise-blocking headphones that were like an unexpected gift from the heavens. Even though everyone else there seemed to be very polite, making almost no noise, having those headphones on brought me back to my happy place. I&#8217;m always wearing headphones at home so it made me feel comfortable, just like when I was studying.</p><p>The room itself was comfortable&#8202;&#8212;&#8202;not too warm, not too cold. There was also a nice hum from the air system, like the brown noise that&#8217;s popular for meditation/focus (<a href="https://www.youtube.com/watch?v=RqzGzwTY-6w&amp;t">check it out</a> and see if you like that kind of sound).</p><p>I didn&#8217;t take a bathroom or snack break, but, had I done so, I knew that the bathroom was close by. This was because I went to the bathroom immediately beforehand (mind that liquid intake on test day!) to wash my hands, take a breath, and psych myself up in the mirror.</p><p>Again, remember that you are able to take breaks during the exam but those <strong>breaks will count against your time</strong>. The 4-hour timer will not stop. There&#8217;s nothing wrong at all with taking breaks as needed, just be aware of the time remaining!</p><p>Of course, if you have any questions or concerns about time and/or breaks going into the exam, be sure to ask the staff. The staff at my location were extremely polite and answered any question I had right away.</p><h3><strong>Post-Clash Clarity: Tips, Takeaways, and&nbsp;Advice</strong></h3><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Fhgv!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd71b9220-aa88-40fa-af3e-354a3767cae1_800x533.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Fhgv!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd71b9220-aa88-40fa-af3e-354a3767cae1_800x533.jpeg 424w, https://substackcdn.com/image/fetch/$s_!Fhgv!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd71b9220-aa88-40fa-af3e-354a3767cae1_800x533.jpeg 848w, https://substackcdn.com/image/fetch/$s_!Fhgv!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd71b9220-aa88-40fa-af3e-354a3767cae1_800x533.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!Fhgv!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd71b9220-aa88-40fa-af3e-354a3767cae1_800x533.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Fhgv!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd71b9220-aa88-40fa-af3e-354a3767cae1_800x533.jpeg" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d71b9220-aa88-40fa-af3e-354a3767cae1_800x533.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:null,&quot;width&quot;:null,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Fhgv!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd71b9220-aa88-40fa-af3e-354a3767cae1_800x533.jpeg 424w, https://substackcdn.com/image/fetch/$s_!Fhgv!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd71b9220-aa88-40fa-af3e-354a3767cae1_800x533.jpeg 848w, https://substackcdn.com/image/fetch/$s_!Fhgv!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd71b9220-aa88-40fa-af3e-354a3767cae1_800x533.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!Fhgv!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd71b9220-aa88-40fa-af3e-354a3767cae1_800x533.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a><figcaption class="image-caption">Photo by <a href="https://unsplash.com/@ravipinisetti?utm_source=medium&amp;utm_medium=referral">Ravi Pinisetti</a> on&nbsp;<a href="https://unsplash.com?utm_source=medium&amp;utm_medium=referral">Unsplash</a></figcaption></figure></div><p>First, I want to mention something that I think is important: <strong>I can only speak to my own experience</strong>. This is also true for anyone else whose advice you may read regarding the CISSP exam. Know that there are many resources out there that make hefty promises, or lob catchy titles meant to drive traffic to their site. I mean, some people even have fully fledged business enterprises out of helping people train, which is, of course, completely fine. However, you don&#8217;t <em>have</em> to take an expensive training course, and you don&#8217;t <em>have </em>to use any particular training material. Just know that your precious dollars are the object of many an entity&#8217;s eye, so be judicious in whose advice you follow (including from me!). Sermon complete. Moving on.</p><p>As you take the exam, you will know right away whether or not certain training materials helped prepare you sufficiently. For me, some materials soared while others floundered.</p><blockquote><p>Some materials soared while others floundered</p></blockquote><p>In an attempt to help you save some dough, here&#8217;s my list of resources that I would consider absolutely <em>essential</em> to your exam prep:</p><ol><li><p><strong><a href="https://www.amazon.com/Certified-Information-Security-Professional-Official/dp/1119790026/ref=pd_lpo_sccl_2/131-3801944-3784832?pd_rd_w=GIExD&amp;content-id=amzn1.sym.1ad2066f-97d2-4731-9356-36b3edf1ae04&amp;pf_rd_p=1ad2066f-97d2-4731-9356-36b3edf1ae04&amp;pf_rd_r=EXH9PA566M3FC09VS7XJ&amp;pd_rd_wg=SUD4D&amp;pd_rd_r=2fa4f123-5741-4a05-923b-63055e6bef91&amp;pd_rd_i=1119790026&amp;psc=1">(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide &amp; Practice Tests Bundle</a></strong>: Just get the bundle! Besides, you should purchase both the OSG and the official practice tests. <strong>The OSG is always your source of truth.</strong></p></li><li><p><strong><a href="https://learnzapp.com/apps/cissp/">LearnZApp</a></strong>: This app is endorsed as the official training app for the CISSP and it&#8217;s worth every penny. It&#8217;s not perfect. For instance, the UI isn&#8217;t my favorite at all, and block text is often presented with little space or separation. While there is duplication of training questions between the app and the official practice exams, there are thousands of questions available. <strong>The included practice exams, which are 125 questions each, are an excellent way of gauging your preparation!</strong></p></li><li><p><strong>Pete Zerger&#8217;s <a href="https://www.youtube.com/watch?v=_nyZhYnCNLA">CISSP Exam Cram Full Course on YouTube</a></strong>: First, it&#8217;s free (woot, woot!). Pete provides almost eight hours of content. What I love about this video is that <strong>he focuses on the important stuff without dwelling on unnecessary details</strong>. He covers important points for every domain topic. I couldn&#8217;t recommend this video enough.</p></li><li><p><strong><a href="https://www.cybrary.it/course/cissp">Cybrary&#8202;&#8212;&#8202;Kelly Handerhan&#8217;s CISSP Course</a></strong>: A monthly Cybrary subscription can be a little pricey, but it&#8217;s worth it to experience Kelly&#8217;s course. While Pete Zerger covers only the essentials, Kelly dives deep into each topic, explaining everything clearly and thoroughly. <strong>Throughout her course, she reinforces how you should approach different topics and helps build what some refer to as &#8220;the CISSP mindset.&#8221;</strong> After her CISSP courses, I&#8217;m a huge Kelly Handerhan fan. She&#8217;s a wonderful teacher.</p></li><li><p><strong>Kelly Handerhan&#8217;s <a href="https://www.youtube.com/watch?v=v2Y6Zog8h2A">Why you will pass the CISSP on YouTube</a></strong>: Continuing on the Handerhan fan train, this is only something you should watch the day of your exam or perhaps the day before. Assuming that you have studied sufficiently for the exam, Kelly provides assurance that you will pass the exam, walking through a few key points in this short, 10-minute video. This was surprisingly helpful!</p></li></ol><p>Now, here&#8217;s the set of resources that I found helpful as supplemental but not quite as helpful:</p><ol><li><p><strong>Wiley&#8202;&#8212;&#8202;free online study questions and flashcards</strong>: Within the OSG, they give you instructions on how to register for access to free online study questions and flashcards provided by Wiley. The coverage wasn&#8217;t comprehensive, yet the content, including the practice questions, was helpful. This is another free resource that should be taken advantage of.</p></li><li><p><strong>Luke Ahmed&#8217;s <a href="https://www.amazon.com/Think-Like-Manager-CISSP-Exam/dp/1735085197">How to Think Like a Manager for the CISSP Exam</a></strong>: You&#8217;ll likely see many mentions of this book throughout different posts on the Internet, as did I, which is why I bought it. I only skimmed through the book and read the first couple of pages. <strong>The book dives deep into example questions to explain, in detail, how to approach CISSP questions and to &#8220;think like a manager&#8221;.</strong> For the money, I think it&#8217;s a bit expensive for how small of a book you get.</p></li><li><p><strong>Destination Certification&#8217;s <a href="https://www.amazon.com/Destination-CISSP-Concise-Rob-Witcher/dp/B0BT1Y6DYL/ref=pd_sim_hxwPM1_sspa_dk_detail_p5_og_dN?pd_rd_w=YSSf1&amp;content-id=amzn1.sym.41d9180b-a439-4c27-808c-98db8d46673c&amp;pf_rd_p=41d9180b-a439-4c27-808c-98db8d46673c&amp;pf_rd_r=KA7522JASZ21YGSKJY03&amp;pd_rd_wg=ytMMp&amp;pd_rd_r=47e60b4a-261e-43e2-bf8c-bcd350417880&amp;pd_rd_i=B0BT1Y6DYL">Destination CISSP: A Concise Guide</a></strong>: The OSG is the OSG&#8202;&#8212;&#8202;you get lots of dry, informative content. But, literally every official study guide is like that. The Destination Certification team delivers a gorgeous textbook (in full color, no less!) that is an amazing bang-for-your-buck buy. I&#8217;d still recommend having the OSG as your primary focus as this book dives into additional details that aren&#8217;t found in the OSG.</p></li><li><p>Mike Chapple&#8217;s <a href="https://transactions.sendowl.com/products/78699615/EC3C7090/view">One-time Practice Exam</a>: What&#8217;s nice about this exam is it doesn&#8217;t allow you to go back to previous questions, just like how the CISSP exam will be. That made me nervous and seems to make a lot of others nervous,&nbsp;too, so this one-time exam was a good practice. I recommend taking this exam a couple of days prior to your actual exam date.</p></li></ol><p>As a quick note, I know that I listed the <a href="https://www.amazon.com/CISSP-All-One-Guide-Ninth/dp/1260467376/ref=pd_bxgy_img_d_sccl_1/131-3801944-3784832?pd_rd_w=h9BiD&amp;content-id=amzn1.sym.2b132e63-5dcd-4ba1-be9f-9e044543d59f&amp;pf_rd_p=2b132e63-5dcd-4ba1-be9f-9e044543d59f&amp;pf_rd_r=KA7522JASZ21YGSKJY03&amp;pd_rd_wg=ytMMp&amp;pd_rd_r=47e60b4a-261e-43e2-bf8c-bcd350417880&amp;pd_rd_i=1260467376&amp;psc=1">CISSP All-in-One Exam Guide, Ninth Edition</a> in my resources list earlier, but I never really gave it a fair shake. Soon after I started reading this I had a lightning strike of realization about how I should probably start with the OSG first. I never got back to this book, deciding to use Destination Certification&#8217;s book as my secondary study guide. I didn&#8217;t see any issues with the All-in-One and it was well written at a fair price point.</p><p>There were a few things I paid for that were somewhat disappointing. The list below represents a few hundred dollars that I should have spent elsewhere:</p><ol><li><p><strong>Thor Teaches&#8202;&#8212;&#8202;<a href="https://cart.thorteaches.com/cissp/">CISSP by Thor Pederson</a></strong>: Now, you&#8217;ll see that others have found a lot of value from Thor&#8217;s material as he&#8217;s well known in the CISSP prep world. But, for me, after listening to several hours of his courses, I came to the realization that the content was simply not effective; too expensive for what you get. His real world experience allows him to speak intelligently on most topics, but after all those hours of watching/listening I noticed that there was added levels of detail that didn&#8217;t seem applicable, so I switched to Mike Chapple&#8217;s online course. Preview Thor&#8217;s material and decide for yourself!</p></li><li><p><strong>Thor Teaches&#8202;&#8212;&#8202;<a href="https://cart.thorteaches.com/cissp-questions/">ALL CISSP questions by Thor + Boson</a></strong>: So while Thor&#8217;s training courses just weren&#8217;t for me, I will say that the practice questions are not a great value. Yes, they will reinforce important topics across the eight domains. Yes, they will be challenging (even some of his &#8220;medium&#8221; questions) and make you think. However, both the Boson questions and his own were nowhere close to the quality and type of questions presented in the OSG and official practice exams (toss LearnZApp in there, too). You pay a lot of money for access to these questions that ask you about technical details you won&#8217;t <em>really</em> need to know for the CISSP. The way the questions are designed are also not helpful for practicing the finding of an answer given a particular scenario. Again, try them yourself and come to your own conclusion.</p></li></ol><p><strong>Perhaps the biggest tip that I can give you is to no be discouraged when motivation is low</strong> or life throws a wrench into your study plan. I rescheduled twice (yup, that was $50 per reschedule) because I knew I wouldn&#8217;t be prepared. <strong>Whatever you&#8217;re feeling in any given moment where times are tough, whether you&#8217;re unsure of yourself, you&#8217;re questioning your abilities, or you feel as if you just don&#8217;t have the energy, my advice is to do </strong><em><strong>something</strong></em><strong> on those difficult days</strong>. Skim the OSG, close your eyes and listen to a video course, flip through flash cards on your phone and drill terms in your head, just do <em>something. </em>I guarantee that you will wake up the next day knowing that you went out of your way to keep up your study grind, and you&#8217;ll feel all the better for it.</p><p><strong>My second tip would be to accept, not deny, feelings of nervousness or anxiety. </strong><a href="https://www.betterup.com/blog/what-is-imposter-syndrome-and-how-to-avoid-it#:~:text=back%20in%201978.-,What%20is%20imposter%20syndrome%3F,phony%22%20and%20doubting%20their%20abilities.">Imposter syndrome</a> is a thing. Feelings of inadequacy may creep up&nbsp;as&nbsp;a&nbsp;natural&nbsp;part&nbsp;of&nbsp;your&nbsp;humanity. Totally understandable anxiety about preparing for the exam and taking the exam may pounce at you constantly. This is normal! Soldier forth while accepting that such feelings don&#8217;t make you weak, they are just a part of life.</p><p>There ain&#8217;t no shame in the having feelings game!</p><p>Allowing yourself to feel those feelings in an honest way will help erase the baggage that can accompany them. I, for one, was insanely nervous sitting for the exam. I likely burned 1,000 calories just bouncing my legs up and down in that exam chair and lost about five pounds of sweat through my hands alone. You&#8217;re not alone and anyone else who&#8217;s readied themselves for something like this, CISSP or not, can relate.</p><p>So, this turned out to be about 3&#8211;1/2 miles longer than I originally intended. If you&#8217;re studying for your CISSP, first of all&#8202;&#8212;&#8202;awesome! I sincerely hope that you&#8217;ll find this content helpful to you in some way.</p><p>Best wishes to all of you and here&#8217;s to an exciting 2024. Cheers!</p>]]></content:encoded></item><item><title><![CDATA[Changing Careers, Chasing Belonging]]></title><description><![CDATA[The powerful urge to belong in the workplace is something we all experience.]]></description><link>https://heroicpanda.com/p/changing-careers-chasing-belonging-e4bf893c15c0</link><guid isPermaLink="false">https://heroicpanda.com/p/changing-careers-chasing-belonging-e4bf893c15c0</guid><dc:creator><![CDATA[Nathan Walker]]></dc:creator><pubDate>Fri, 18 Aug 2023 15:19:22 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/9f680c59-da00-4de7-82da-9dc5b093402c_1200x1800.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!vE8u!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1bd4a66f-ef06-495d-aea0-4161e367d112_1200x1800.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!vE8u!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1bd4a66f-ef06-495d-aea0-4161e367d112_1200x1800.jpeg 424w, https://substackcdn.com/image/fetch/$s_!vE8u!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1bd4a66f-ef06-495d-aea0-4161e367d112_1200x1800.jpeg 848w, https://substackcdn.com/image/fetch/$s_!vE8u!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1bd4a66f-ef06-495d-aea0-4161e367d112_1200x1800.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!vE8u!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1bd4a66f-ef06-495d-aea0-4161e367d112_1200x1800.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!vE8u!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1bd4a66f-ef06-495d-aea0-4161e367d112_1200x1800.jpeg" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/1bd4a66f-ef06-495d-aea0-4161e367d112_1200x1800.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:null,&quot;width&quot;:null,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!vE8u!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1bd4a66f-ef06-495d-aea0-4161e367d112_1200x1800.jpeg 424w, https://substackcdn.com/image/fetch/$s_!vE8u!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1bd4a66f-ef06-495d-aea0-4161e367d112_1200x1800.jpeg 848w, https://substackcdn.com/image/fetch/$s_!vE8u!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1bd4a66f-ef06-495d-aea0-4161e367d112_1200x1800.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!vE8u!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1bd4a66f-ef06-495d-aea0-4161e367d112_1200x1800.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a><figcaption class="image-caption">Photo by <a href="https://unsplash.com/@raphi_rawr?utm_source=medium&amp;utm_medium=referral">Raphael Renter</a> on&nbsp;<a href="https://unsplash.com?utm_source=medium&amp;utm_medium=referral">Unsplash</a></figcaption></figure></div><p>Last year, at my old company, I was fortunate enough to emcee an event focused on the topic of &#8220;belonging&#8221;. I was on a committee for the LEAD by Women employee resource group (ERG) and we had enlisted the talents of <a href="https://www.roygluckman.com/">Roy Gluckman</a>, a fabulous speaker, to tune in virtually from his native South Africa and deliver the keynote for the day.</p><p>Roy presented &#8220;belonging&#8221;, generally, as something that we as humans seek naturally; the innate desire within us to find safety, to find comfort in the spaces in which we inhabit. His use of the word &#8220;spaces&#8221; was intentional, as &#8220;spaces&#8221; can be created through various means. Organizations provide a space of collaboration towards a common goal, working towards whatever that organization is looking to achieve. And, whenever we join an organization, Roy surmised, we are <em>immediately </em>looking for how we need to act in order to belong.</p><p>One of his main points, I remember, is that a human&#8217;s desire to belong is so strong that we will automatically tune our behaviors towards belonging. Many of us, upon joining a group or organization, will change how we act based on our perceptions of what is expected and accepted. Like a radar pinpointing an object&#8217;s exact location, we will affix ourselves towards behaviors that allow us to fit in, regardless of whether or not those behaviors are true expressions of who we are.</p><p>The opposite of modifying how we act to better assimilate with a group was, of course, feeling that we naturally belong to a given space. The challenge here is for those who feel they <em>do</em> belong to look inward at the environment their groups create, or they themselves may have the power to create, and ask, &#8220;Does everyone feel as if they belong here? Are we leaving room for everyone to feel welcome and comfortable?&#8221;</p><h3>What does it mean to&nbsp;belong?</h3><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!tNMZ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5e3f53fc-2b1b-4ee3-a9a9-3c6f85179e17_800x533.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!tNMZ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5e3f53fc-2b1b-4ee3-a9a9-3c6f85179e17_800x533.jpeg 424w, https://substackcdn.com/image/fetch/$s_!tNMZ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5e3f53fc-2b1b-4ee3-a9a9-3c6f85179e17_800x533.jpeg 848w, https://substackcdn.com/image/fetch/$s_!tNMZ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5e3f53fc-2b1b-4ee3-a9a9-3c6f85179e17_800x533.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!tNMZ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5e3f53fc-2b1b-4ee3-a9a9-3c6f85179e17_800x533.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!tNMZ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5e3f53fc-2b1b-4ee3-a9a9-3c6f85179e17_800x533.jpeg" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5e3f53fc-2b1b-4ee3-a9a9-3c6f85179e17_800x533.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:null,&quot;width&quot;:null,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!tNMZ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5e3f53fc-2b1b-4ee3-a9a9-3c6f85179e17_800x533.jpeg 424w, https://substackcdn.com/image/fetch/$s_!tNMZ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5e3f53fc-2b1b-4ee3-a9a9-3c6f85179e17_800x533.jpeg 848w, https://substackcdn.com/image/fetch/$s_!tNMZ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5e3f53fc-2b1b-4ee3-a9a9-3c6f85179e17_800x533.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!tNMZ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5e3f53fc-2b1b-4ee3-a9a9-3c6f85179e17_800x533.jpeg 1456w" sizes="100vw"></picture><div></div></div></a><figcaption class="image-caption">Photo by <a href="https://unsplash.com/@chne_?utm_source=medium&amp;utm_medium=referral">Tachina Lee</a> on&nbsp;<a href="https://unsplash.com?utm_source=medium&amp;utm_medium=referral">Unsplash</a></figcaption></figure></div><p>The title of his talk that day was, <strong>&#8220;What is Belonging&#8202;&#8212;&#8202;Really?&#8221;</strong> And that&#8217;s an extraordinary question. I mean, <em>what <strong>is</strong> it</em>? What does it truly mean to belong to something?</p><p>Think about it, if I were to ask you, <em>&#8220;What&#8217;s the weather going to be like today?&#8221;</em>, you would likely pull out your phone, pop open the pre-installed weather app, and lob some meteorological details my way. That&#8217;s an example of a question that you&#8217;re ready to respond to. But, if I were to ask you, &#8220;What does belonging <em>mean to you</em>?&#8221;, I&#8217;d hazard a guess that there wouldn&#8217;t be an automatic answer. The question is now not about something with an objective answer, but about what something means to <em>you</em>.</p><p>When I was at my old company and the focus of our ERG work that year was on the word &#8220;belonging,&#8221; I noticed how a word can suddenly be both familiar and unfamiliar at the same time. I knew the word yet didn&#8217;t know what it really meant to me.</p><p>If you were to ask me to define &#8220;belonging&#8221; for you, I&#8217;d likely have no problem trying to think about the word&#8217;s formal definition, maybe trying to work in what it means through context. My answer would be my honest answer. But, if you asked me if I <em>feel</em> like I belong, that would probably give me pause. As I imagine it, I&#8217;m not sure I&#8217;d know how to answer right away. This isn&#8217;t to say that I wouldn&#8217;t be honest with you, but you can see how vastly different defining a word is from reflecting on the embodiment of the word itself, belonging&#8217;s presence in real-world form. To me, it&#8217;s a striking difference and a difference worth reflecting upon.</p><p>I guess it&#8217;s too late for me to say that I&#8217;m not trying to get all &#8220;deep&#8221; on you, here? Whoops. Oh well, I&#8217;ll just keep going with it.</p><p>Kim Samuels <a href="https://www.psychologytoday.com/us/blog/the-power-of-belonging/202304/the-new-psychology-of-belonging">wrote in Psychology Today</a> about how Maslow&#8217;s famous hierarchy of needs comments on belonging, with Maslow describing it as the need for &#8220;friendship, intimacy, family, and <strong>connection</strong>.&#8221; We want to connect with others in a genuine manner, aligned and attuned to the group. Samuels herself describes belonging in a beautiful way, stating,</p><blockquote><p>Belonging is a principle that gets to the essence of what makes us human.</p></blockquote><p>*Chef&#8217;s kiss* &#128105;&#8205;&#127859;</p><p>So, if belonging is part of what makes us human, how do we handle belonging at work?</p><p>I added &#8220;changing careers&#8221; to the title of this post because, as a career changer, that&#8217;s where I go to first when I think about belonging in the workplace. Going from absolutely feeling like I belonged as a music teacher and musician, to feeling like an outsider in the world of tech, is an easy example for me to share with others. Many other kinds of career shifters, though, may be able to relate with the struggles of belonging:</p><ul><li><p>Former military members, transitioning into the civilian workforce</p></li><li><p>People going back to school, feeling the struggles of being an adult student while also juggling the pressure of launching a new career</p></li><li><p>People jumping from one company to another within the same field or role</p></li><li><p>A person switching teams within the same company, still in the same building, yet leaving behind what&#8217;s familiar</p></li></ul><p>These are but a few of what I&#8217;m sure could be countless examples of when times of transition force us to reckon with belonging. Even if we&#8217;re not conscious of our efforts that propel us to belong, like a finely tuned algorithm we are immediately absorbing, processing, and deciding our behaviors whenever we join a new workplace environment. We want to be a part of the group and we want others to know that we&#8217;re invested, same as them.</p><p>In his talk, Roy Gluckman talked about how the responsibility for belonging falls on both the individual&#8217;s shoulders and that of the organization&#8217;s leaders:</p><ul><li><p>Leaders are responsible for creating a welcoming space where people feel they are free to belong as themselves, and</p></li><li><p>Members of a group, especially those who feel as if they belong, have a precious role to play in ensuring that a welcoming environment is built and maintained</p></li></ul><p>There&#8217;s a third point to be made, too, I feel, where people need to give themselves grace and allow themselves to see that they deserve to belong.</p><h3>Imposter syndrome&#8202;&#8212;&#8202;Belonging&#8217;s evil step-sibling</h3><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!klQm!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa80443a3-f26b-4811-a926-023a420d95d6_800x533.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!klQm!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa80443a3-f26b-4811-a926-023a420d95d6_800x533.jpeg 424w, https://substackcdn.com/image/fetch/$s_!klQm!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa80443a3-f26b-4811-a926-023a420d95d6_800x533.jpeg 848w, https://substackcdn.com/image/fetch/$s_!klQm!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa80443a3-f26b-4811-a926-023a420d95d6_800x533.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!klQm!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa80443a3-f26b-4811-a926-023a420d95d6_800x533.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!klQm!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa80443a3-f26b-4811-a926-023a420d95d6_800x533.jpeg" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a80443a3-f26b-4811-a926-023a420d95d6_800x533.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:null,&quot;width&quot;:null,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!klQm!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa80443a3-f26b-4811-a926-023a420d95d6_800x533.jpeg 424w, https://substackcdn.com/image/fetch/$s_!klQm!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa80443a3-f26b-4811-a926-023a420d95d6_800x533.jpeg 848w, https://substackcdn.com/image/fetch/$s_!klQm!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa80443a3-f26b-4811-a926-023a420d95d6_800x533.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!klQm!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa80443a3-f26b-4811-a926-023a420d95d6_800x533.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a><figcaption class="image-caption">Photo by <a href="https://unsplash.com/@joshuaearle?utm_source=medium&amp;utm_medium=referral">Joshua Earle</a> on&nbsp;<a href="https://unsplash.com?utm_source=medium&amp;utm_medium=referral">Unsplash</a></figcaption></figure></div><p>Even in the most welcoming of spaces, if you do not allow yourself to believe that you <em>can</em> belong, you may mistakenly kneecap your ability to grow. Doubt can seep into how you view yourself, your skills, and how much you deserve to occupy a given space. Just like in the picture above, you can find yourself alone in a lake of self-isolation. If this were a scary movie script, this is when that foul beast, <strong>imposter syndrome</strong>, would enter the room.</p><p>Imposter syndrome is that kid in class that&#8217;s always stepping on the heels of the shoes of belonging, laughing as belonging trips in the hallway.</p><p>The modern business world is rife with talk about imposter syndrome (or, as one National Institute of Health page lists it, <a href="https://www.ncbi.nlm.nih.gov/books/NBK585058/">&#8220;Imposter </a><em><a href="https://www.ncbi.nlm.nih.gov/books/NBK585058/">Phenomenon</a></em><a href="https://www.ncbi.nlm.nih.gov/books/NBK585058/">&#8221;</a>&#8202;&#8212;&#8202;love it). <a href="https://en.wikipedia.org/wiki/Impostor_syndrome#:~:text=Impostor%20syndrome%2C%20also%20known%20as,of%20being%20exposed%20as%20frauds.">Imposter syndrome</a> occurs when an individual feels as if they do not belong where they are, regardless of whether or not they deserve to be where they are. This syndrome can afflict everyone from beginners to high-performing professionals with years of excellent achievement.</p><p>Now, please note that I am no psychologist myself, but the word &#8220;syndrome&#8221; here is not used to denote a formal, psychological condition. Imposter syndrome is just a term that has fallen into the mainstream vernacular, describing periods of time when you may doubt yourself in the professional realm. You should know, though, that:</p><blockquote><p>Everyone struggles with doubt at different times in their&nbsp;career.</p></blockquote><p>When I first changed careers, I felt that everyone would know I was a career changer, so therefore everyone would see through my facade and know I&#8217;m a fraud. My struggle with imposter syndrome was heavy and followed me like a cloud. I just knew that people would know that I&#8217;m inexperienced and unsure, in spite of my personal studies and all the hard work I put forward to develop my skills.</p><p>Then I realized this was all wholly untrue.</p><p>Not only did people actually have faith in my abilities, but most people also never had a clue that I came from a completely unrelated career path! The manager I had at my last job, whom I had known for years, had no idea (for better or for worse) that I had other degrees and fruitful experiences from a past career. Even at my current job, some people do not know my full background unless it&#8217;s shared in conversation.</p><p>In looking back to those first few years post-career change, I wonder how much more I could have grown in that organization had I simply removed some of the barriers I was imposing on myself. I wish I had freed myself from the self-imposed shackles of doubt which were doing nothing but limiting my ability to grow, to let myself feel like I <em>did</em> belong to be there.</p><p>One does not cut a trail to belonging solely on their own, but self-doubt may blind you to opportunities you were unwilling to let yourself see.</p><h3>Allowing yourself to&nbsp;belong</h3><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!nSNe!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0010ee8b-f920-43cf-be2e-128d7749866a_800x533.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!nSNe!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0010ee8b-f920-43cf-be2e-128d7749866a_800x533.jpeg 424w, https://substackcdn.com/image/fetch/$s_!nSNe!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0010ee8b-f920-43cf-be2e-128d7749866a_800x533.jpeg 848w, https://substackcdn.com/image/fetch/$s_!nSNe!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0010ee8b-f920-43cf-be2e-128d7749866a_800x533.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!nSNe!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0010ee8b-f920-43cf-be2e-128d7749866a_800x533.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!nSNe!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0010ee8b-f920-43cf-be2e-128d7749866a_800x533.jpeg" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0010ee8b-f920-43cf-be2e-128d7749866a_800x533.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:null,&quot;width&quot;:null,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!nSNe!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0010ee8b-f920-43cf-be2e-128d7749866a_800x533.jpeg 424w, https://substackcdn.com/image/fetch/$s_!nSNe!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0010ee8b-f920-43cf-be2e-128d7749866a_800x533.jpeg 848w, https://substackcdn.com/image/fetch/$s_!nSNe!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0010ee8b-f920-43cf-be2e-128d7749866a_800x533.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!nSNe!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0010ee8b-f920-43cf-be2e-128d7749866a_800x533.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a><figcaption class="image-caption">Photo by <a href="https://unsplash.com/@michaelrfenton?utm_source=medium&amp;utm_medium=referral">Michael Fenton</a> on&nbsp;<a href="https://unsplash.com?utm_source=medium&amp;utm_medium=referral">Unsplash</a></figcaption></figure></div><p>Sometimes, something like imposter syndrome can sprinkle doubt into our day to day, posing as a heightened sense self-awareness like a wolf in a sheep&#8217;s clothing. We may think that we&#8217;re being honest with ourselves and realistic, but, in reality, we are likely being too harsh on ourselves based on unaccepted, perhaps unacknowledged, fears we still harbor. DDS Dobson-Smith, in a Harvard Business Review article, <a href="https://hbr.org/2022/08/a-sense-of-belonging-starts-with-self-acceptance">encourages us to be kind to ourselves</a> and work towards self-acceptance of who you are and what you can bring to the table.</p><p>Working to appreciate yourself, or in the very least, <strong>working to not doubt yourself</strong>, can help you feel like you&#8217;ve removed a barbell of worry from your back.</p><p>In all fairness, there will likely be times where you realize that you do <em>not</em> belong somewhere and that&#8217;s okay! As Roy talked about, all of the different kinds of spaces we interact with every day either enable or disable belonging for some individuals.</p><blockquote><p>Looking at our immediate spaces with honest eyes will help us be more empathetic to how others may be experiencing the worlds we live in and how we may or may not fit into those worlds, healthily, ourselves.</p></blockquote><p>Recognizing areas where you do not belong can be empowering. Such recognition may lead to you seek fresh opportunities or allow you to become a catalyst for change within your organization.</p><p>Based on my no-research approach, I&#8217;d say that most of the people you work with in your day-to-day have struggled with belonging in their professional lives. Some may still struggle with feeling as if they belong, whether it be at their company in general, their team, or the position they hold.</p><p>Thinking about belonging again has helped me realize that empathy is a fantastically mighty tool that we should all keep handy more often.</p><p>Here&#8217;s hoping that we all continue working to accept ourselves for who we truly are and forge spaces that allow everyone to feel welcomed and comfortable.</p>]]></content:encoded></item><item><title><![CDATA[Step aside Security+ — Google’s Cybersecurity Certificate is the new Sheriff in town]]></title><description><![CDATA[This spring, Google announced that they had a brand new professional certificate course, the Google Cybersecurity Certificate program. I&#8230;]]></description><link>https://heroicpanda.com/p/step-aside-security-googles-cybersecurity-certificate-is-the-new-sheriff-in-town-32ce0e9128fd</link><guid isPermaLink="false">https://heroicpanda.com/p/step-aside-security-googles-cybersecurity-certificate-is-the-new-sheriff-in-town-32ce0e9128fd</guid><dc:creator><![CDATA[Nathan Walker]]></dc:creator><pubDate>Sun, 30 Jul 2023 14:57:33 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/b869a885-c712-403b-9542-b6b91d97bbad_2560x1702.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!lKW3!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd0b06abc-4125-422a-9a2c-a6102e5b3835_2560x1702.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!lKW3!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd0b06abc-4125-422a-9a2c-a6102e5b3835_2560x1702.jpeg 424w, https://substackcdn.com/image/fetch/$s_!lKW3!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd0b06abc-4125-422a-9a2c-a6102e5b3835_2560x1702.jpeg 848w, https://substackcdn.com/image/fetch/$s_!lKW3!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd0b06abc-4125-422a-9a2c-a6102e5b3835_2560x1702.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!lKW3!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd0b06abc-4125-422a-9a2c-a6102e5b3835_2560x1702.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!lKW3!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd0b06abc-4125-422a-9a2c-a6102e5b3835_2560x1702.jpeg" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d0b06abc-4125-422a-9a2c-a6102e5b3835_2560x1702.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:null,&quot;width&quot;:null,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!lKW3!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd0b06abc-4125-422a-9a2c-a6102e5b3835_2560x1702.jpeg 424w, https://substackcdn.com/image/fetch/$s_!lKW3!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd0b06abc-4125-422a-9a2c-a6102e5b3835_2560x1702.jpeg 848w, https://substackcdn.com/image/fetch/$s_!lKW3!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd0b06abc-4125-422a-9a2c-a6102e5b3835_2560x1702.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!lKW3!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd0b06abc-4125-422a-9a2c-a6102e5b3835_2560x1702.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a><figcaption class="image-caption">Photo by <a href="https://unsplash.com/@kimberlyfarmer?utm_source=medium&amp;utm_medium=referral">Kimberly Farmer</a> on&nbsp;<a href="https://unsplash.com?utm_source=medium&amp;utm_medium=referral">Unsplash</a></figcaption></figure></div><p>This spring, Google announced that they had a brand new professional certificate course, the <strong>Google Cybersecurity Certificate </strong>program. I am not the target demographic for this course, as I am already working in security, but I was so excited to check it out that I took it myself!</p><p>What follows below are my thoughts after completing all coursework for this new and exquisite offering from Google.</p><blockquote><p>&#8220;But soft, what light through yonder window breaks?<br>It is the east, and <strong>Google&#8217;s Cybersecurity Certificate</strong> is the sun.&#8221;&nbsp;<br>&#8212; Shakespeare(-ish)</p></blockquote><p>For years now I have seen countless posts from individuals who have been searching for a job in cybersecurity. Often times aspiring security professionals vulnerably share how they have been searching for junior/entry-level security positions with no success. They may speak about how they have never heard feedback from potential employers after a rejection, or reflect on the frustration they feel after filling out hundreds and hundreds of applications for seemingly no reward.</p><p>Do you want to know what the large majority of people jumping into security have? The CompTIA Security+ certification.</p><p>Now, <strong>this is no knock on achieving this certification</strong>. Becoming certified after long hours of study, investment into study materials, surrendering lots of your own time, then sitting down to pass a long, formal exam, is absolutely something to celebrate! If you earned certifications then you should be proud of your accomplishments. But, many people earn certifications, especially the Security+, thinking that a specific certification is the gateway into a new job or breaking into a tech/IT career. Thinking that certifications will equal a new job, or a promotion, mayor frequently lead to disappointment.</p><p>The Security+ isn&#8217;t going away any time soon. So, what are people to do?</p><p>Below I will talk about how I think <a href="https://grow.google/certificates/cybersecurity/#?modal_active=none">Google&#8217;s new Cybersecurity Certificate</a> program far outshines self-study for the Security+ alone. I&#8217;ll share my thoughts on why I think the Security+ alone should carry less weight with learners, why Google&#8217;s new training is top notch, and how this new course and the Security+, when combined, could make for a very strong candidate.</p><h3>What gives&#8230; you&#8217;re against the Security+?</h3><p>No, not at all! The crux of my argument is not so much <em>against</em> the Security+ itself&#8202;&#8212;&#8202;as it is a valid certification granted from a legitimate body, CompTIA, and an actual requirement for some government/military positions&#8212; but against the perpetuation of the idea that the Security+ is the <em>best</em> way to get started as you jump off the diving board and into</p><p>The Security+ will definitely help you get familiar with fundamental security knowledge and get you into the professional vernacular,<strong> but it won&#8217;t help you develop </strong><em><strong>skills</strong></em><strong>.</strong></p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!nL7t!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F016ff2bb-139c-4924-adcd-177cac57d8d7_800x533.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!nL7t!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F016ff2bb-139c-4924-adcd-177cac57d8d7_800x533.jpeg 424w, https://substackcdn.com/image/fetch/$s_!nL7t!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F016ff2bb-139c-4924-adcd-177cac57d8d7_800x533.jpeg 848w, https://substackcdn.com/image/fetch/$s_!nL7t!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F016ff2bb-139c-4924-adcd-177cac57d8d7_800x533.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!nL7t!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F016ff2bb-139c-4924-adcd-177cac57d8d7_800x533.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!nL7t!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F016ff2bb-139c-4924-adcd-177cac57d8d7_800x533.jpeg" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/016ff2bb-139c-4924-adcd-177cac57d8d7_800x533.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:null,&quot;width&quot;:null,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!nL7t!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F016ff2bb-139c-4924-adcd-177cac57d8d7_800x533.jpeg 424w, https://substackcdn.com/image/fetch/$s_!nL7t!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F016ff2bb-139c-4924-adcd-177cac57d8d7_800x533.jpeg 848w, https://substackcdn.com/image/fetch/$s_!nL7t!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F016ff2bb-139c-4924-adcd-177cac57d8d7_800x533.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!nL7t!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F016ff2bb-139c-4924-adcd-177cac57d8d7_800x533.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a><figcaption class="image-caption">Photo by <a href="https://unsplash.com/@sevenshooterimage?utm_source=medium&amp;utm_medium=referral">Seven Shooter</a> on&nbsp;<a href="https://unsplash.com?utm_source=medium&amp;utm_medium=referral">Unsplash</a></figcaption></figure></div><h3>A quick bit on&nbsp;learning</h3><p>Allow me to digress for a second (sorry, I get really excited about this stuff!).</p><p>I have always felt that the pursuit of knowledge is a noble pursuit; an educated individual is an empowered individual. However, when it comes to one&#8217;s professional life, one must consider whether or not knowledge alone is the best path forwards toward career development and future success. This was the case in music and is certainly the case in tech. If you are going to work so hard to build knowledge, like with studying for the Security+, you owe it to yourself to be equally prepared to work just as hard on skills development.</p><p>Knowledge, separate from application, is theory; having knowledge by itself means that you have theoretical knowledge. Knowledge directly applied towards something, tied directly towards something you can <em>do, </em>means that you have a practical means of <em>applying</em> that knowledge. Thus, practical knowledge.</p><blockquote><p><strong>Knowledge + Intentional application of knowledge = Skills development</strong></p></blockquote><p>Am I a behavioral science expert-person? No. But, I am a person who learned an entirely new set of skills as an adult and knows how learning is a battle. I also know that time is limited, so picking the best route towards learning is crucial.</p><p>Regardless of discipline, building knowledge, devoid of a practical approach in how to apply that knowledge, is a lonely endeavor. What good is having tons of knowledge if you have no way to demonstrate that knowledge, other than reciting facts or taking an exam? If you&#8217;re learning something just to gain the knowledge, there&#8217;s nothing wrong with that, but when it comes to professional development you want to have that practical piece of the puzzle, too.</p><p>That&#8217;s my main point. Studying for the Security+ may net you new knowledge about security concepts and terminology, but the Security+ in and of itself leaves you naked in the cold when it comes to skills. You worked hard for that piece of CompTIA paper, yet may not have the skills to back to up. Worse yet, training courses are geared towards helping you pass a test and may not be geared towards teaching you the concepts in full.</p><p>Perhaps there are better ways to gain a proper security knowledge foundation aside from simply grabbing a Security+ book.</p><p>That&#8217;s where Google&#8217;s Cybersecurity Certificate program comes in&#8202;&#8212;&#8202;trying to teach you new things while also allowing you to <em>apply</em> those new things.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!5SuX!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9bf6326-53a1-43a4-b20c-51c4a115334a_800x800.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!5SuX!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9bf6326-53a1-43a4-b20c-51c4a115334a_800x800.jpeg 424w, https://substackcdn.com/image/fetch/$s_!5SuX!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9bf6326-53a1-43a4-b20c-51c4a115334a_800x800.jpeg 848w, https://substackcdn.com/image/fetch/$s_!5SuX!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9bf6326-53a1-43a4-b20c-51c4a115334a_800x800.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!5SuX!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9bf6326-53a1-43a4-b20c-51c4a115334a_800x800.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!5SuX!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9bf6326-53a1-43a4-b20c-51c4a115334a_800x800.jpeg" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f9bf6326-53a1-43a4-b20c-51c4a115334a_800x800.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:null,&quot;width&quot;:null,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!5SuX!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9bf6326-53a1-43a4-b20c-51c4a115334a_800x800.jpeg 424w, https://substackcdn.com/image/fetch/$s_!5SuX!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9bf6326-53a1-43a4-b20c-51c4a115334a_800x800.jpeg 848w, https://substackcdn.com/image/fetch/$s_!5SuX!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9bf6326-53a1-43a4-b20c-51c4a115334a_800x800.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!5SuX!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9bf6326-53a1-43a4-b20c-51c4a115334a_800x800.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a><figcaption class="image-caption">Photo by <a href="https://unsplash.com/@laurenedvalson?utm_source=medium&amp;utm_medium=referral">Lauren Edvalson</a> on&nbsp;<a href="https://unsplash.com?utm_source=medium&amp;utm_medium=referral">Unsplash</a></figcaption></figure></div><h3>Google&#8217;s Cybersecurity training is great and you should take&nbsp;it</h3><p>What I&#8217;m advocating for is not to cut out the Security+ entirely, or to even circumvent job requirements in some way when the Security+ is expected. What I am encouraging is, if we were to think of a learning journey in phases, put the Security+ certification effort as a Phase II in your learning journey. I believe Google&#8217;s Cybersecurity Certificate could be Phase I.</p><p>Why am I saying this Google training is great? Because I took it myself and I think that <strong>is</strong> great!</p><p>I was familiar with almost all of the material, but I treated it like a refresher, a chance to help fill some knowledge gaps in my fundamentals.</p><blockquote><p>I wanted to finally have something solid to recommend to entry-level people and to know that my recommendation comes from me doing the work, diving into it&nbsp;myself.</p></blockquote><p>I won&#8217;t go into tons of detail about the Google course since I have <a href="https://medium.com/@heroic_panda/why-googles-new-cybersecurity-certificate-matters-1d25cc522899">an entire blog post about it</a>, but I will share the main points that make Google&#8217;s curriculum an attractive one.</p><p>Below are six reasons why I think this course is great.</p><h4>Reason you should take it #1: You craft a professional portfolio</h4><p>Almost immediately, Google has students preparing a professional portfolio. The entire curriculum is geared towards a total beginner who may have little to no technical knowledge or experience. Google had this in mind, I believe, since Google knows that demonstrable skills can come in handy when formal experience is limited. After all, Google and other companies are known to hire standouts who can perform extremely well but who may not have a specific academic pedigree. By the end, students will have a professional portfolio that includes, among others:</p><ul><li><p>Completed risk assessment</p></li><li><p>Dashboards of security metrics</p></li><li><p>Incident response journal, with details from several different incidents</p></li><li><p>Writings about Linux commands and how they may be used in the workplace</p></li><li><p>And lots, lots more</p></li></ul><p>Now students who complete the program will have a diversified, professional portfolio they can showcase to prospective companies. I love this approach, as the end goal isn&#8217;t just to say, &#8220;I took Google&#8217;s Cybersecurity Certificate program,&#8221; but to say, &#8220;I took Google&#8217;s Cybersecurity Certificate program <em><strong>and</strong></em> here&#8217;s a link to the portfolio of my work!&#8221;</p><p>And I think that&#8217;s really neat.</p><h4>Reason #2: You&#8217;re handed a full curriculum</h4><p>Not everyone is a self-study superstar. I know people that can pick up concepts remarkably quick and are extremely intelligent folks, but us mere mortals may struggle with approaching new topics.</p><p>Even if you have all of the best learning materials, from study guides, to practice exams, to online lab portals, you still need to formulate an approach for how you will start learning something new. Some people may do this naturally, yet many may struggle.</p><p>Google does that hard work for you by having a ready-made curriculum covering all of the important, foundational security topics. All you need to do is follow their lessons step-by-step.</p><p>Think about it like baking a cake. If you want to research how to bake a cake, I&#8217;m sure you could find tons of content online about appropriate ratios of different ingredients, how much or how little flour is needed, what goes into creating flavored batter, etc. I have no doubt that you&#8217;d learn so much in doing that. But, if you buy a box of cake mix, what do you have on the back? All you need to do is follow the steps, add a couple small ingredients, pop it in the oven, and <em>voila</em>! You have a delicious cake.</p><p>Google&#8217;s security course is like buying the cake mix. Let them do the hard work required to flesh out lesson plans. All that&#8217;s required from you is to follow the path they&#8217;ve laid out for you and complete the steps.</p><p>Great, now I&#8217;m hungry for cake!</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!TvCS!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd24cf49a-dc9c-4462-84c8-bf46373efc55_800x1200.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!TvCS!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd24cf49a-dc9c-4462-84c8-bf46373efc55_800x1200.jpeg 424w, https://substackcdn.com/image/fetch/$s_!TvCS!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd24cf49a-dc9c-4462-84c8-bf46373efc55_800x1200.jpeg 848w, https://substackcdn.com/image/fetch/$s_!TvCS!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd24cf49a-dc9c-4462-84c8-bf46373efc55_800x1200.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!TvCS!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd24cf49a-dc9c-4462-84c8-bf46373efc55_800x1200.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!TvCS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd24cf49a-dc9c-4462-84c8-bf46373efc55_800x1200.jpeg" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d24cf49a-dc9c-4462-84c8-bf46373efc55_800x1200.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:null,&quot;width&quot;:null,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!TvCS!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd24cf49a-dc9c-4462-84c8-bf46373efc55_800x1200.jpeg 424w, https://substackcdn.com/image/fetch/$s_!TvCS!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd24cf49a-dc9c-4462-84c8-bf46373efc55_800x1200.jpeg 848w, https://substackcdn.com/image/fetch/$s_!TvCS!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd24cf49a-dc9c-4462-84c8-bf46373efc55_800x1200.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!TvCS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd24cf49a-dc9c-4462-84c8-bf46373efc55_800x1200.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a><figcaption class="image-caption">Photo by <a href="https://unsplash.com/@karlygomez?utm_source=medium&amp;utm_medium=referral">Karly Gomez</a> on&nbsp;<a href="https://unsplash.com?utm_source=medium&amp;utm_medium=referral">Unsplash</a></figcaption></figure></div><h4>Reason #3: Google covers Security+ content</h4><p>The normal approach to studying for your Security+ certification is to buy the official study guide (many people buy more than one study guide), buy/find a video course to watch, and perhaps adding on expensive performance-based question labs.</p><p>Aside from the labs, which are extremely limited in functionality, you&#8217;re simply absorbing, memorizing, and attempting to comprehend new content that is separate from application (remember me mentioning Theoretical vs. Practical?). There&#8217;s a possibility that you&#8217;ll learn many new things, yet the aim is to pass an exam, not to set the groundwork for security skills.</p><p>So, why not go after a study path that begins with a combination of listening to and watching content, in addition to the hands-on goodness of labs? Reading about things is great but you <strong>need</strong> that practice of applying something in order to soak everything in. You may read about Linux permissions and memorize them for the test, but will you remember them when it comes time to modify a user&#8217;s access in production?</p><p>Google&#8217;s coursework touches on the Security+ objectives and them some. The inclusion of heavy Python material is amazing, since programming is a skill that many security professionals rely on.</p><p>If you ask me, I&#8217;d use this course from Google as Phase I of my Security+ prep, <em>then</em> dive into full-on study of purely Security+ material as Phase II. That way you have a foundation of how to apply everything before you drown in a myriad of dry certification material.</p><p>Important: if you take Google&#8217;s course and want to jump into getting your Security+, you should absolutely grab a study guide or two. Google&#8217;s classes are wonderful, but I would by no means recommend that someone take the Security+ after taking their classes alone. Supplement that learning with Security+-specific study and you&#8217;ll be good to go.</p><h4>Reason #4: For the money, it&#8217;s the best way to&nbsp;start</h4><p>A Security+ study guide, depending on which book you buy, will likely run you $25&#8211;50 USD. One month of <a href="https://www.coursera.org/courseraplus">Coursera Plus</a> will run you $59 USD (at the time of this writing).</p><p>If you dedicate 1&#8211;2 hours per day, plus several hours of your weekend each week, I believe most people would be able to work a great amount of the Google Cybersecurity content.</p><blockquote><p>The goal isn&#8217;t to take the course, or any on-demand course, as quickly as possible, the goal is to take your time. Take advantage of on-demand learning to learn at the pace that works best for&nbsp;you.</p></blockquote><p>I say it&#8217;s the best way to start for the money because, if you&#8217;re truly entering the course from Level 0, you&#8217;ll be given a more gentle introduction to topics AND be given the chance to be hands on with Linux and other important tech. Remember, too, that you&#8217;ll be building a portfolio as you complete certain assignments. Pretty cool, right?</p><p>If you spend your hard-earned money just on a Security+ book alone, you may have an excellent resource on your hands, but you&#8217;ll miss out on the chance to gets your hands dirty with the tech itself. For someone new, getting hands on experience early can make learning something new all the more exciting.</p><h4>Reason #5: Finish Google&#8217;s course, get 30% off the Security+ exam</h4><p>Let&#8217;s say you really want to earn your Security+. That&#8217;s the goal. Well, consider that <strong>paying for one CompTIA Security+ exam voucher will cost you $392 USD</strong> (as of this writing&#8202;&#8212;&#8202;check out the official exam page <a href="https://www.comptia.org/certifications/security">here</a> for current info). Completing the Google certificate will net you a 30% discount off of the exam cost.</p><blockquote><p>$392 x 0.3 = $117.6 USD off of your&nbsp;exam!</p></blockquote><p>For a lot of people, that&#8217;s a huge discount, especially considering how most people who switch careers have bills to pay, perhaps even a family to take care of. How to wisely invest your money towards your learning should always be a part of your plan.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!99RX!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9d52fbe-4521-41bf-a17c-ebc4360ed171_800x1200.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!99RX!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9d52fbe-4521-41bf-a17c-ebc4360ed171_800x1200.jpeg 424w, https://substackcdn.com/image/fetch/$s_!99RX!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9d52fbe-4521-41bf-a17c-ebc4360ed171_800x1200.jpeg 848w, https://substackcdn.com/image/fetch/$s_!99RX!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9d52fbe-4521-41bf-a17c-ebc4360ed171_800x1200.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!99RX!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9d52fbe-4521-41bf-a17c-ebc4360ed171_800x1200.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!99RX!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9d52fbe-4521-41bf-a17c-ebc4360ed171_800x1200.jpeg" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a9d52fbe-4521-41bf-a17c-ebc4360ed171_800x1200.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:null,&quot;width&quot;:null,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!99RX!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9d52fbe-4521-41bf-a17c-ebc4360ed171_800x1200.jpeg 424w, https://substackcdn.com/image/fetch/$s_!99RX!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9d52fbe-4521-41bf-a17c-ebc4360ed171_800x1200.jpeg 848w, https://substackcdn.com/image/fetch/$s_!99RX!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9d52fbe-4521-41bf-a17c-ebc4360ed171_800x1200.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!99RX!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9d52fbe-4521-41bf-a17c-ebc4360ed171_800x1200.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a><figcaption class="image-caption">Photo by <a href="https://unsplash.com/@micheile?utm_source=medium&amp;utm_medium=referral">micheile henderson</a> on&nbsp;<a href="https://unsplash.com?utm_source=medium&amp;utm_medium=referral">Unsplash</a></figcaption></figure></div><h4>Reason #6: Not everyone actually needs to get the Security+</h4><p>You will see the Security+ listed on tons of security-related roles, but, is it required? Examples of positions that may formally <em>require</em> this certification are roles within the United States&#8217; federal government or jobs within the military. Here, you have to either hold the certification prior to being hired (you won&#8217;t be considered for the role if you don&#8217;t have it), or you commit to earning it within a certain timeframe after starting the job. This is what most Security+ training is aimed towards, since there are thousands and thousands of people who truly need to get the certification to get, or keep, their jobs.</p><p>If you don&#8217;t absolutely <em>have</em> to get a certification then I would consider if the cost, both of your money and time, is worth it. Your resources are finite, so I&#8217;d encourage you to see if a position you&#8217;re aiming for will require it or not. If not, there&#8217;s no harm in learning the material without committing to taking the exam.</p><p>I respect how each person&#8217;s journey is their own. As you take the time to figure out how you will learn, you&#8217;ll likely see varying opinions from individual to individual.</p><p>&#8220;Nathan,&#8221; you may say, &#8220;I completely disagree with you and I&#8217;m going to go straight for my Security+ certification.&#8221; That&#8217;s great! You will likely see posts and opinions that differ from my own, as you should. You are responsible for doing your homework and taking a look at your current situation, needs, and resources. You need to follow the path that is best for <em>you.</em></p><p>Regardless of what you choose to do, go after it! Be tenacious in your learning and the knowledge and skills will come.</p>]]></content:encoded></item><item><title><![CDATA[Why Google’s New Cybersecurity Certificate Matters]]></title><description><![CDATA[Recently, Google launched their Google Cybersecurity Professional Certificate, a certificate training program designed to take an&#8230;]]></description><link>https://heroicpanda.com/p/why-googles-new-cybersecurity-certificate-matters-1d25cc522899</link><guid isPermaLink="false">https://heroicpanda.com/p/why-googles-new-cybersecurity-certificate-matters-1d25cc522899</guid><dc:creator><![CDATA[Nathan Walker]]></dc:creator><pubDate>Fri, 12 May 2023 11:21:02 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/370e70bd-c56a-467c-b358-47bb90a6ff27_2560x1707.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!H6L2!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc084f7e0-0e07-44a7-af43-840b60418632_2560x1707.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!H6L2!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc084f7e0-0e07-44a7-af43-840b60418632_2560x1707.jpeg 424w, https://substackcdn.com/image/fetch/$s_!H6L2!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc084f7e0-0e07-44a7-af43-840b60418632_2560x1707.jpeg 848w, https://substackcdn.com/image/fetch/$s_!H6L2!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc084f7e0-0e07-44a7-af43-840b60418632_2560x1707.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!H6L2!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc084f7e0-0e07-44a7-af43-840b60418632_2560x1707.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!H6L2!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc084f7e0-0e07-44a7-af43-840b60418632_2560x1707.jpeg" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c084f7e0-0e07-44a7-af43-840b60418632_2560x1707.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:null,&quot;width&quot;:null,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!H6L2!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc084f7e0-0e07-44a7-af43-840b60418632_2560x1707.jpeg 424w, https://substackcdn.com/image/fetch/$s_!H6L2!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc084f7e0-0e07-44a7-af43-840b60418632_2560x1707.jpeg 848w, https://substackcdn.com/image/fetch/$s_!H6L2!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc084f7e0-0e07-44a7-af43-840b60418632_2560x1707.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!H6L2!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc084f7e0-0e07-44a7-af43-840b60418632_2560x1707.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a><figcaption class="image-caption">Photo by <a href="https://unsplash.com/@pawel_czerwinski?utm_source=medium&amp;utm_medium=referral">Pawel Czerwinski</a> on&nbsp;<a href="https://unsplash.com?utm_source=medium&amp;utm_medium=referral">Unsplash</a></figcaption></figure></div><p>Recently, Google launched their <strong><a href="https://grow.google/certificates/cybersecurity/?utm_source=google&amp;utm_medium=blog&amp;utm_campaign=cyber__geo--US&amp;utm_content=#?modal_active=none">Google Cybersecurity Professional Certificate</a></strong>, a certificate training program designed to take an individual with no technical experience and help prepare them for an entry-level role in cybersecurity in six months or less. Delivered through their formal partnership with <a href="https://www.coursera.org/">Coursera</a>, learning materials are made available for free (auditing the class, as it&#8217;s called, which would not grant you the certificate), or full course access and completion is available at a subscription cost of $49 USD/month (after the initial 7-day free trial).</p><p><strong>Offerings like this are extremely vital to breaking down barriers to entry for cybersecurity!</strong> These barriers exist for people looking to find entry-level roles, for individuals interested in switching careers, or for students looking to augment grade school or university studies. Such courses are not a silver bullet for addressing the cybersecurity jobs gap, but they help.</p><p>Google does not mislead potential learners in what their offering will lead to, mind you. They do not claim to take you from Level 0-to-CISO in six months, since that wouldn&#8217;t be reasonable for any mortal. What they do claim is to be able to sufficiently prepare someone for an <em>entry-level</em> role, regardless of experience level, within a six-month timeframe. That is quite the challenge and I think Google has championed the task quite well.</p><h3>Why six&nbsp;months&#8230;?</h3><p>I get it, I was wondering the same thing.</p><p>This timeframe comes from Google&#8217;s own estimated time of completion, should a learner work on their course for 10 hours or less per week. With those numbers, they estimate that completing the course would take you six months of part-time effort, costing you <strong>$300 USD</strong> in total if you pay $49/month. I advise that you take these &#8220;hours&#8221; estimates with a grain of salt, at least until you have a taste for the course and can gauge the speed in which you&#8217;ll be able to tackle the material.</p><p><strong>My take</strong>: Most students and/or career switchers I&#8217;ve known are particularly hungry and ambitious, so 10 hours of work per week is the <em>least</em> amount of time a motivated individual may put towards the certificate. If you have days off of work/weekends, you could easily devote 10+ hours of dedicated study to the course, keeping in mind their coursework completion estimates factor in time that you may or may not need. You&#8217;d be surprised how much you could accomplish with a focused hour of study each day!</p><p>What Coursera may designate as one, two, or three weeks of material is achievable and digestible within a few sittings. Trust me, I&#8217;ve done it! And that was without pulling all-nighters or anything crazy.</p><p>Knocking out this coursework in less than six months, while still taking in material appropriately (and, most importantly, maintaining your sanity), is 100% doable.</p><h3>Why is it important, though?</h3><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!xSmy!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9be495cd-b85f-42ca-b4ed-e98c9ccc52f5_800x534.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!xSmy!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9be495cd-b85f-42ca-b4ed-e98c9ccc52f5_800x534.jpeg 424w, https://substackcdn.com/image/fetch/$s_!xSmy!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9be495cd-b85f-42ca-b4ed-e98c9ccc52f5_800x534.jpeg 848w, https://substackcdn.com/image/fetch/$s_!xSmy!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9be495cd-b85f-42ca-b4ed-e98c9ccc52f5_800x534.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!xSmy!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9be495cd-b85f-42ca-b4ed-e98c9ccc52f5_800x534.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!xSmy!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9be495cd-b85f-42ca-b4ed-e98c9ccc52f5_800x534.jpeg" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9be495cd-b85f-42ca-b4ed-e98c9ccc52f5_800x534.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:null,&quot;width&quot;:null,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!xSmy!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9be495cd-b85f-42ca-b4ed-e98c9ccc52f5_800x534.jpeg 424w, https://substackcdn.com/image/fetch/$s_!xSmy!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9be495cd-b85f-42ca-b4ed-e98c9ccc52f5_800x534.jpeg 848w, https://substackcdn.com/image/fetch/$s_!xSmy!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9be495cd-b85f-42ca-b4ed-e98c9ccc52f5_800x534.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!xSmy!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9be495cd-b85f-42ca-b4ed-e98c9ccc52f5_800x534.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a><figcaption class="image-caption">Photo by <a href="https://unsplash.com/@towfiqu999999?utm_source=medium&amp;utm_medium=referral">Towfiqu barbhuiya</a> on&nbsp;<a href="https://unsplash.com?utm_source=medium&amp;utm_medium=referral">Unsplash</a></figcaption></figure></div><p>I think in my last blog I kept asking myself questions as writing prompts, so I&#8217;ll just keep riding that wave here, too&#8230;</p><p>The world of tech is awash with certifications of every shape and size, with everyone from the major tech giants (Google included) to startups offering their own certifications, training certificates (<strong>training certificates are not the same as a formal certification</strong>, FYI&#8202;&#8212;&#8202;these are akin to what you may receive at the end of a Udemy or LinkedIn Learning course), and their own courses which relate to their own certifications.</p><p>Each one of these certifications have training materials that cost money, often in the form of colossal books and/or web-based labs, plus the cost of <em>attempting</em> the certification exam itself. Many, many companies are also designed around offering full blown training courses, based entirely around certifications, which cost upwards of several thousand dollars. For some of the most basic of certifications, like CompTIA A+ or CompTIA Security+, which are expected for many entry-level IT jobs,</p><blockquote><p><strong>one CompTIA exam attempt alone costs more than if you took six months&#8217; time to study Google&#8217;s Cybersecurity Professional Certificate!</strong></p></blockquote><p>Here again, in my opinion, I think many learners would be able to complete the course in less time than that. <strong>Imagine how much you would be able to accomplish as a learner through the guided curriculum and perhaps supplementing with other quality materials over six months of study</strong>. There&#8217;s a slew of high quality books and materials covering Python, security fundamentals, pen testing, etc. with which to supplement your learning, too.</p><p><strong>Please note</strong>: Certifications, like CompTIA and Cisco, are still very much in demand. I will always recommend that you only invest in a specific certification path if the job you&#8217;re aiming for requires it (e.g. the U.S. federal government, cloud security, risk management, the list goes on). <strong>The choice for how you invest your money and time will always be yours, but make that investment</strong> <em>wisely</em>!</p><p>Here, Google only requires that you complete the required training material, which includes many, many quizzes, hands-on activities, and end-of-segment/course exams. If you sufficiently pass each module within each course, then congrats! You have earned the Google Cybersecurity Professional Certificate.</p><h3>The Curriculum is Important</h3><p>Aside from cost alone, what Google covers is wonderful and on point. Starting with the basics, they guide you through concepts that gradually become more advanced and toss professional portfolio material into the mix as well.</p><p>Most Coursera certificates rely on you completing not just one course but a bundle of related courses aimed at a certain learning objective. Google&#8217;s Cybersecurity Certificate is no different as <strong>you will be expected to complete 8 courses in all</strong>. Here are the courses, in learning order:</p><ol><li><p>Foundations of Cybersecurity</p></li><li><p>Play It Safe: Manage Security Risks</p></li><li><p>Connect and Protect: Networks and Network Security</p></li><li><p>Tools of the Trade: Linux and SQL</p></li><li><p>Assets, Threats, and Vulnerabilities</p></li><li><p>Sound the Alarm: Detection and Response</p></li><li><p>Automate Cybersecurity Tasks with Python</p></li><li><p>Put It to Work: Prepare for Cybersecurity Jobs</p></li></ol><blockquote><p>I think Google does a fantastic job of introducing people to a variety of security roles and letting people know that there are a variety of roles/ways to enter the security&nbsp;field.</p></blockquote><p>Keep in mind that each and every course contains several glossaries of key terms and external links to outside, supplemental materials. The first course alone introduces you to resources like the <a href="https://www.nist.gov/cyberframework">NIST Cybersecurity Framework</a> and <a href="https://csrc.nist.gov/projects/risk-management/about-rmf">Risk Management Framework</a>, as well as closely related topics like data privacy, which are important for any security professional to know.</p><p>Remember how I mentioned CompTIA&#8217;s exam costs above? Well, Google claims that their coursework will simultaneously prepare students for the CompTIA Security+ exam! <strong>Students that complete the certificate will be eligible for a 30% discount on the Security+ exam</strong>, which I think is a wonderful side benefit to the curriculum. Good job, Google team.</p><p>[Insert high-five here. Or fist bump. I&#8217;m cool with either one.]</p><h3>CISSP Domain Integration</h3><p>Google has incorporated a certification into the mix that has been omnipresent in the security world for quite some time now: the CISSP.[pause for dramatic effect]</p><p>Created by (ISC)&#178; in 1994, the <a href="https://www.isc2.org/Certifications/CISSP">CISSP</a> is arguably the preeminent security certification across the corporate world and is quite common for mid-level, senior, or management level security professionals within large security departments. The CISSP&#8217;s material is split across eight different domains and security pros must have at least 5 years of experience, prior to passing the exam, in order to become a fully certified CISSP (provisional status is granted to folks who pass the exam but don&#8217;t yet have the experience).</p><p>The integration of CISSP domains into the curriculum is super cool, I think, because right away the student is thinking of something other than entry-level material, whether know so or not. If they are truly entering this course with no prior experience, they are being exposed to certification material that carries a lot of weight on one&#8217;s resume down the road and may give them a goal post to set for themselves. <strong>Students are passively exposed to long-term goals by virtue of having their curriculum already aligned with CISSP domains. </strong>Awesome.</p><h3>Real Stories from Real&nbsp;People</h3><p>Sprinkled throughout the courses are small nuggets of wisdom from actual Google security personnel who come from all manner of backgrounds, technical and not.</p><p>They share 1&#8211;2 minute stories, related to the topic at hand, from their own personal experience. One specific cloud security architect (a career changer herself&#8202;&#8212;&#8202;woot, woot!) had a beautiful example of responsible security ethics in the workplace. How cool is it that they sought to bring ethics early into the conversation? Kudos on that move, Google.</p><p>They openly share anecdotes from their work lives. They describe events from their careers, security related or non-security related. <strong>They give encouragement to those who think security may not be for them.</strong></p><p>People transitioning into tech and young students need to know that they will be working with all kinds of different people, from all kinds of walks of life, perhaps from all around the world. I think Google does a solid job of bringing in both a variety of roles and a variety of workplace representation, which allows for compelling stories and may broaden the perspectives of some learners.</p><p>Additionally, people need to see that career changers also find their way into big companies like Google and find success. The folks who share within the course videos come from all walks of life and humbly tell of how they had no idea they would be working in the field, or at the company, they are today.</p><blockquote><p>Career changers need positive examples like this so that they may see how much is possible and that success is within their&nbsp;grasp.</p></blockquote><h3>Complete the Certificate&#8202;&#8212;&#8202;Get Introduced to Employers</h3><p>Students that complete the program have the option to present their resume to the Google Career Certificates Employer Consortium. As Google says,</p><blockquote><p>&#8220;The consortium includes more than 150 employers including American Express, Colgate-Palmolive, Mandiant (now part of Google Cloud), T-Mobile, Walmart and Google. Members of the Employer Consortium consider those who have earned our Certificates for entry-level jobs.&#8221;</p></blockquote><p>Super cool, right? That alone is reason enough to complete the certificate. All of these companies have competitive talent pools, I&#8217;m certain, but having a direct line to submit your achievement and resume is worth the shot, I say. Plus, career preparation is part of last course segment in the series.</p><p><strong>What I find even more exciting is that these major companies, as part of the consortium, </strong><em><strong>are letting Google know what they need from entry-level cybersecurity pros</strong></em>.</p><p>Think about it. A company as influential as Google will naturally be able to partner with companies on a scale that few others can, so when I look at this curriculum I think it&#8217;s an honest reflection of what an employer could expect from an entry-level professional in the security arena.</p><h3>Another Reason Why This Cybersecurity Certificate Matters</h3><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!XS5f!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fab7d285d-ff02-406e-8d06-f21bcff2b460_800x533.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!XS5f!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fab7d285d-ff02-406e-8d06-f21bcff2b460_800x533.jpeg 424w, https://substackcdn.com/image/fetch/$s_!XS5f!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fab7d285d-ff02-406e-8d06-f21bcff2b460_800x533.jpeg 848w, https://substackcdn.com/image/fetch/$s_!XS5f!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fab7d285d-ff02-406e-8d06-f21bcff2b460_800x533.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!XS5f!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fab7d285d-ff02-406e-8d06-f21bcff2b460_800x533.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!XS5f!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fab7d285d-ff02-406e-8d06-f21bcff2b460_800x533.jpeg" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ab7d285d-ff02-406e-8d06-f21bcff2b460_800x533.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:null,&quot;width&quot;:null,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!XS5f!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fab7d285d-ff02-406e-8d06-f21bcff2b460_800x533.jpeg 424w, https://substackcdn.com/image/fetch/$s_!XS5f!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fab7d285d-ff02-406e-8d06-f21bcff2b460_800x533.jpeg 848w, https://substackcdn.com/image/fetch/$s_!XS5f!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fab7d285d-ff02-406e-8d06-f21bcff2b460_800x533.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!XS5f!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fab7d285d-ff02-406e-8d06-f21bcff2b460_800x533.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a><figcaption class="image-caption">Photo by <a href="https://unsplash.com/ko/@eddrobertson?utm_source=medium&amp;utm_medium=referral">Ed Robertson</a> on&nbsp;<a href="https://unsplash.com?utm_source=medium&amp;utm_medium=referral">Unsplash</a></figcaption></figure></div><p>Google&#8217;s course offering, in a field ripe with job opportunities that also offers the promise of financial reward via high salaries and benefits, breaks down barriers to entry, like I said before.</p><blockquote><p>High quality, accessible education for all -&nbsp;matters.</p></blockquote><p>My path to career change started because I found high quality coursework from Harvard via <a href="https://www.edx.org/">Edx.org</a>, where Harvard and now many other institutions make their course content available for free. Their introductory computer science course, CS50 (massively popular now as a MOOC), changed my life. Even though I didn&#8217;t pay for the full course I still listened to the lectures and did the exercises on my own before deciding to enroll in school again full-time.</p><p>While I am still a proponent of a well-rounded education whenever possible, the reality is that not everyone can afford the time demands or the financial burden involved with going back to school.</p><blockquote><p>Google&#8217;s cybersecurity certificate offers an affordable pathway for people who want to learn about security to do so without sacrificing quality of instruction, without sacrificing too much of their time, and then giving them a verifiable credential at the end of the&nbsp;process.</p></blockquote><p>All you need is a computer with a basic network connection and you&#8217;re good to go!</p><p>Any group that makes high quality content this accessible, while also working to connect learners with potential employers, will continue to garner my support.</p>]]></content:encoded></item><item><title><![CDATA[It’s Never Too Late to Change Careers]]></title><description><![CDATA[It&#8217;s a Thursday afternoon like any other Thursday afternoon. Perhaps it&#8217;s a quiet day, where the atmosphere around you is settled and the&#8230;]]></description><link>https://heroicpanda.com/p/its-never-too-late-to-change-careers-30433c928dfa</link><guid isPermaLink="false">https://heroicpanda.com/p/its-never-too-late-to-change-careers-30433c928dfa</guid><dc:creator><![CDATA[Nathan Walker]]></dc:creator><pubDate>Wed, 19 Apr 2023 00:06:37 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/8e218c7e-72be-42ba-b092-467c695e58f0_800x533.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!yp4g!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3b0db354-d77b-4d84-a4bf-539688c62f53_800x533.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!yp4g!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3b0db354-d77b-4d84-a4bf-539688c62f53_800x533.jpeg 424w, https://substackcdn.com/image/fetch/$s_!yp4g!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3b0db354-d77b-4d84-a4bf-539688c62f53_800x533.jpeg 848w, https://substackcdn.com/image/fetch/$s_!yp4g!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3b0db354-d77b-4d84-a4bf-539688c62f53_800x533.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!yp4g!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3b0db354-d77b-4d84-a4bf-539688c62f53_800x533.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!yp4g!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3b0db354-d77b-4d84-a4bf-539688c62f53_800x533.jpeg" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3b0db354-d77b-4d84-a4bf-539688c62f53_800x533.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:null,&quot;width&quot;:null,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Business person standing outside building with arms out, looking up&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Business person standing outside building with arms out, looking up" title="Business person standing outside building with arms out, looking up" srcset="https://substackcdn.com/image/fetch/$s_!yp4g!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3b0db354-d77b-4d84-a4bf-539688c62f53_800x533.jpeg 424w, https://substackcdn.com/image/fetch/$s_!yp4g!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3b0db354-d77b-4d84-a4bf-539688c62f53_800x533.jpeg 848w, https://substackcdn.com/image/fetch/$s_!yp4g!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3b0db354-d77b-4d84-a4bf-539688c62f53_800x533.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!yp4g!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3b0db354-d77b-4d84-a4bf-539688c62f53_800x533.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a><figcaption class="image-caption">Photo by <a href="https://unsplash.com/@nullplus?utm_source=medium&amp;utm_medium=referral">Razvan Chisu</a> on&nbsp;<a href="https://unsplash.com?utm_source=medium&amp;utm_medium=referral">Unsplash</a></figcaption></figure></div><p>It&#8217;s a Thursday afternoon like any other Thursday afternoon. Perhaps it&#8217;s a quiet day, where the atmosphere around you is settled and the air seems still. Mouse clicks and keyboard taps are the arrhythmic soundtrack of the day, just like every other day.</p><p>Or, maybe it&#8217;s not a Thursday, perhaps it&#8217;s a Tuesday, or a Monday. Maybe you&#8217;re at the office or you&#8217;re at home. It could be any day.</p><p>The point is how, at this point during this particular afternoon, all is strikingly <strong>normal</strong>. Agonizingly normal. This feeling of normality may have rushed past you unnoticed on any other working day, but, today of all days, you notice that the normalcy has a weight to it.</p><p>As the days go by, you realize a growing sense of self and the pang of normalcy that struck you on that day. Your awareness level while at work begins to rise, like the feeling of slowing opening one&#8217;s eyes, and you realize that you are noticing more of what is around you. Perhaps you see how your manager truly interacts with your team while in meetings, or how disengaged you feel with your work when you are supposed to be on task, or that each day is beginning to feel just like every other day, or that you&#8217;re realizing you are never really happy at work, or...</p><p>Whatever you are beginning to realize, the point is that you are realizing <em><strong>something isn&#8217;t right</strong></em>. And you begin to think that the bubbling feeling of realization may just be the need for change on the horizon.</p><blockquote><p>The first step in knowing that change is possible is realizing that there is room for change to take&nbsp;place.</p></blockquote><p>While what I just described above may or may not apply to you and your situation, part of it is truly what happened to me. Before working in tech I had worked extremely hard to reach a certain level of skill in music and in choir directing, but, suddenly while teaching, realized that a career shift was going to be necessary for me in my life.</p><blockquote><p><strong>The key for me was the sudden realization that a change was needed in the first place.</strong></p></blockquote><p>Trust me, I wrestled with myself for a long time before surrendering to the truth that I:</p><ol><li><p>Was not happy in the teaching profession</p></li><li><p>Had worked incredibly hard to be a strong musician and people leader, and</p></li><li><p>Had zero clue what to do next</p></li></ol><p>I felt lost. I felt ungrateful for the opportunities I had worked for and had been afforded through my education, networking, and sheer luck. But, as I sat on my couch after a long day at work and was truly honest with myself, at some point I had reached the point of no return; I understood my time as a teacher was limited and it was time to strike out and discover my next adventure.</p><blockquote><p>The first step in knowing that change is possible is realizing that there is room for change to take&nbsp;place.</p></blockquote><p>Before moving forward, I want to make a few things crystal clear. I&#8217;ll break down the following three points in detail later on:</p><ul><li><p><strong>Changing careers is 100% possible</strong>, regardless of age or the industry vertical you want to enter into.</p></li><li><p><strong>Career change is achievable at any age. </strong>We&#8217;ll revisit this later, don&#8217;t worry (I mean, it is kind of in the title after all if it&#8217;s &#8220;never too late&#8221;!).</p></li><li><p><strong>Changing careers will take courage, discipline, and perseverance.</strong></p></li></ul><p>&#8220;Nothing worth having comes easily,&#8221; said Someone Famous, right? And, they&#8217;re correct! I wanted to articulate those three points because, if you hear it from no one else, I want you to hear it from me&#8202;&#8212;&#8202;you can absolutely succeed in changing careers. I say that because I have not only walked-the-talk myself but I have seen many others do the same.</p><p>Now, on to the juicy stuff!</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!atjt!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b75fb24-ec8d-4773-b3dc-7d093e0c3848_800x533.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!atjt!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b75fb24-ec8d-4773-b3dc-7d093e0c3848_800x533.jpeg 424w, https://substackcdn.com/image/fetch/$s_!atjt!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b75fb24-ec8d-4773-b3dc-7d093e0c3848_800x533.jpeg 848w, https://substackcdn.com/image/fetch/$s_!atjt!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b75fb24-ec8d-4773-b3dc-7d093e0c3848_800x533.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!atjt!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b75fb24-ec8d-4773-b3dc-7d093e0c3848_800x533.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!atjt!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b75fb24-ec8d-4773-b3dc-7d093e0c3848_800x533.jpeg" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2b75fb24-ec8d-4773-b3dc-7d093e0c3848_800x533.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:null,&quot;width&quot;:null,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!atjt!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b75fb24-ec8d-4773-b3dc-7d093e0c3848_800x533.jpeg 424w, https://substackcdn.com/image/fetch/$s_!atjt!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b75fb24-ec8d-4773-b3dc-7d093e0c3848_800x533.jpeg 848w, https://substackcdn.com/image/fetch/$s_!atjt!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b75fb24-ec8d-4773-b3dc-7d093e0c3848_800x533.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!atjt!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b75fb24-ec8d-4773-b3dc-7d093e0c3848_800x533.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a><figcaption class="image-caption">Photo by <a href="https://unsplash.com/@joshcouchdesign?utm_source=medium&amp;utm_medium=referral">Josh Couch</a> on&nbsp;<a href="https://unsplash.com?utm_source=medium&amp;utm_medium=referral">Unsplash</a></figcaption></figure></div><h3><strong>Changing careers is 100%&nbsp;possible</strong></h3><p>So you&#8217;ve had your moment(s) of epiphany, taken the leap, and realized that a major change is needed in your career. Woohoo! Now what do you do? Well, I&#8217;m glad you asked.</p><p>The way I see it, the people that decide to change careers roughly fall into three camps: (1) Some people already maintain &#8220;side hustles&#8221; (<em>cough</em> second jobs <em>cough</em>) that simply turn full-time, (2) others may already have some idea of what they want to pursue, and (3) others may know that change is necessary and have no clue (like me!) of what they should go after. All of the above are correct and totally fine.</p><p>Once the spark of desire for change is lit, my #1 suggestion is:</p><ul><li><p>If your current job doesn&#8217;t put your mental and/or physical health at risk, <strong>keep it</strong> (pay those bills!)</p></li><li><p>As best as you can, keep money coming in as you learn about career paths, gain new skills, and search for new jobs</p></li></ul><p>On top of that, here&#8217;s my advice:</p><ol><li><p>You&#8217;re 100% sure of what to do next&#8202;&#8212;&#8202;Amazing (in hindsight I&#8217;m very jealous). You are still taking a big leap but you have confidence that comes from knowing exactly what you want to do! I&#8217;d still encourage careful research in how you conduct your next steps. The key for this cohort is <strong>perseverance </strong>and commitment to see it through.</p></li><li><p>You have <em>some</em> idea, but not sure. Here is where patience is key, if possible! Maybe you&#8217;re thinking about cybersecurity because you&#8217;ve heard it has great earning potential, but then you&#8217;ve always wanted to go to law school to get that JD and be an attorney. Whatever your personal choices, <strong>I would suggest making a compare/contrast for each of your options</strong>. What is the salary potential for each position? Is work-from-home important to you? Would you be willing to relocate for that particular new position? Take these questions into consideration, among many others, and let them stew for a while. Bonus points if you ask professionals in your area, or on LinkedIn, for informational interviews to learn more about what they do. The idea here is to better broaden your horizons by chasing after the ideas you already have. Take notes and take action.</p></li><li><p>Alright, so you have <strong>NO</strong> idea what you want to do. <em>You are my people</em>. Please know that I&#8217;ve been in your shoes and you have my full heart&#8217;s worth of empathy. I know it&#8217;s tough. For you, my suggestion is to start doing some soul searching to see what excites and what you think may ignite your ability to learn and grow in a different field. <strong>Here there are no wrong answers because all the options are available. </strong>For this group, inaction is your enemy. Taking action, of any kind, towards your goal of seeking career change will help establish the <strong>momentum</strong> that will carry you forward. To help, I curated a couple things to get the creative juices flowing. Follow along as we dive into this Group #3 some more.</p></li></ol><p>For this last group, Google is both your friend and your foe as there is an ocean of resources our there. I&#8217;ve looked for a few resources which may be helpful, but know that there are many more that may be of benefit to you:</p><ul><li><p><a href="https://extension.harvard.edu/blog/5-tips-for-changing-careers/">5 Tips for Changing Careers | Harvard Extension School</a>&#8202;&#8212;&#8202;My favorite is how their first tip is to <strong>start with a self-assessment</strong>. Where are you now? Where do you want to go?</p></li><li><p><a href="https://hbr.org/2021/07/the-right-way-to-make-a-big-career-transition">The Right Way to Make a Big Career Transition (hbr.org)</a>&#8202;&#8212;&#8202;This one is a big read, but, as you read, he <strong>really pushes you to think and brainstorm</strong>. And no, I have all but zero affiliation with Harvard, this just happened this way, I promise.</p></li><li><p><a href="https://jobs.theguardian.com/article/how-to-approach-a-career-change-and-secure-your-next-job">How to Change Your Career | Guardian Jobs (theguardian.com)</a>&#8202;&#8212;&#8202;This arose from the 2020 COVID pandemic era yet is quite relevant. The Guardian provides a short read that offers insights into reasons why people change careers, the benefits, and the risks involved.</p></li><li><p><a href="https://www.roberthalf.co.nz/career-advice/find-job/career-change">Time for a career change? | Robert Half</a>&#8202;&#8212;&#8202;This! Part of <strong>this article has you taking stock in your current skills and talents</strong>. Remember, you&#8217;re changing careers, so you already have a valuable set of skills with which to populate parts of that next career&#8217;s resume!</p></li></ul><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!wXDJ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffff54e1d-b275-4d1d-8570-57413d9c79e8_800x450.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!wXDJ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffff54e1d-b275-4d1d-8570-57413d9c79e8_800x450.jpeg 424w, https://substackcdn.com/image/fetch/$s_!wXDJ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffff54e1d-b275-4d1d-8570-57413d9c79e8_800x450.jpeg 848w, https://substackcdn.com/image/fetch/$s_!wXDJ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffff54e1d-b275-4d1d-8570-57413d9c79e8_800x450.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!wXDJ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffff54e1d-b275-4d1d-8570-57413d9c79e8_800x450.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!wXDJ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffff54e1d-b275-4d1d-8570-57413d9c79e8_800x450.jpeg" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/fff54e1d-b275-4d1d-8570-57413d9c79e8_800x450.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:null,&quot;width&quot;:null,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!wXDJ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffff54e1d-b275-4d1d-8570-57413d9c79e8_800x450.jpeg 424w, https://substackcdn.com/image/fetch/$s_!wXDJ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffff54e1d-b275-4d1d-8570-57413d9c79e8_800x450.jpeg 848w, https://substackcdn.com/image/fetch/$s_!wXDJ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffff54e1d-b275-4d1d-8570-57413d9c79e8_800x450.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!wXDJ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffff54e1d-b275-4d1d-8570-57413d9c79e8_800x450.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a><figcaption class="image-caption">Photo by <a href="https://unsplash.com/@schmidy?utm_source=medium&amp;utm_medium=referral">Austin Schmid</a> on&nbsp;<a href="https://unsplash.com?utm_source=medium&amp;utm_medium=referral">Unsplash</a></figcaption></figure></div><h3><strong>Career change is achievable at any&nbsp;age</strong></h3><p>Since everyone asks ChatGPT everything these days, I asked, &#8220;How old is too old to change careers?&#8221; ChatGPT actually gave a very friendly and encouraging reply, which I will share a snippet of here:</p><blockquote><p>There&#8217;s no specific age that&#8217;s &#8220;too old&#8221; to change careers. It really depends on various factors such as the individual&#8217;s health, financial stability, job market demand, and their willingness to learn new skills.</p></blockquote><p>Not bad, eh? I agree! I don&#8217;t think one is ever too old to say that it&#8217;s time for something new in their professional life.</p><p>I know I shared how, when I realized I needed a career change from teaching music, I had zero idea of what I wanted to do. Well, eventually I started taking free computer science classes online and realized that I enjoyed the science and the analysis portions of that material. Plus, programming stuff and making things happen on the screen was pretty cool, so I decided I&#8217;d jump into tech.</p><p>When I made the decision to pursue a career in tech, I knew that traditional education was my preferred method of learning. Higher education, while expensive and requiring loans, provides a highly structured learning environment, applied internships (for most technical programs, at least), and is often an easy gateway into full-time employment. Since I already had a Bachelor&#8217;s degree and knew that enrolling in a graduate program in an unrelated field would require 1&#8211;2 years of prerequisite work, I enrolled in a post-baccalaureate program at a large, public university. This meant that I would earn a full Bachelor&#8217;s degree, but I would be exempt from taking all non-core classes within the curriculum (which was amazing, I can&#8217;t lie).</p><blockquote><p>While back in school, students in my class ranged in age from 18 to&nbsp;60+.</p></blockquote><p>Some were fresh out of high school, some were adults who worked full-time and pursued their degrees at night, and some were members of the armed forces who served and were utilizing their G.I. Bill to earn their degree. I was amazed by the diversity of ages in each of my classes, in addition to the extreme range of experience levels.</p><blockquote><p>I had convinced myself that I would know less than everyone else in every class, simply because I was a career changer. In truth, that was never the&nbsp;case.</p></blockquote><p>Psychologists call this the &#8220;<a href="https://www.psychologytoday.com/us/blog/the-big-questions/201111/the-spotlight-effect">spotlight effect</a>&#8221;, where you think everyone else notices you for what you notice internally within yourself. However, just like I realized that there was a need for change, I eventually realized that everyone else struggled with learning just as much as I did sometimes, and <strong>there was no need to feel inferior just because I had started back from Square 1 on the career ladder.</strong></p><p>Currently I work in information security for a stellar company, doing work that is both engaging and meaningful. Now that I have worked in tech for some years, I have seen many, many people older than myself on LinkedIn earn CompTIA certifications like A+, Network+, and/or Security+, which is amazing to see (if you&#8217;re not in tech/IT, those are IT certifications). Also, I&#8217;ve seen countless adults pursue ethical hacking and/or penetration testing studies on LinkedIn (if you&#8217;re not a security person, no worries&#8202;&#8212;&#8202;those are just tech topics/skills), which is simply wonderful. It&#8217;s exciting to see.</p><p><strong>Do not let your age define you</strong>. Do not let your age prevent you from thinking a career change is not within reach. Yes, take stock of your situation, and, yes, always evaluate your options and analyze decisions carefully before taking action, but <strong>know that a career change is always 100% within your grasp.</strong></p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!WgVr!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8ed60142-5666-4714-ad91-eaf0339a5985_800x372.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!WgVr!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8ed60142-5666-4714-ad91-eaf0339a5985_800x372.jpeg 424w, https://substackcdn.com/image/fetch/$s_!WgVr!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8ed60142-5666-4714-ad91-eaf0339a5985_800x372.jpeg 848w, https://substackcdn.com/image/fetch/$s_!WgVr!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8ed60142-5666-4714-ad91-eaf0339a5985_800x372.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!WgVr!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8ed60142-5666-4714-ad91-eaf0339a5985_800x372.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!WgVr!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8ed60142-5666-4714-ad91-eaf0339a5985_800x372.jpeg" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/8ed60142-5666-4714-ad91-eaf0339a5985_800x372.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:null,&quot;width&quot;:null,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!WgVr!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8ed60142-5666-4714-ad91-eaf0339a5985_800x372.jpeg 424w, https://substackcdn.com/image/fetch/$s_!WgVr!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8ed60142-5666-4714-ad91-eaf0339a5985_800x372.jpeg 848w, https://substackcdn.com/image/fetch/$s_!WgVr!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8ed60142-5666-4714-ad91-eaf0339a5985_800x372.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!WgVr!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8ed60142-5666-4714-ad91-eaf0339a5985_800x372.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a><figcaption class="image-caption">Photo by <a href="https://unsplash.com/@karim_manjra?utm_source=medium&amp;utm_medium=referral">Karim MANJRA</a> on&nbsp;<a href="https://unsplash.com?utm_source=medium&amp;utm_medium=referral">Unsplash</a></figcaption></figure></div><h3><strong>Changing careers will take courage, discipline, and perseverance</strong></h3><p>Look at the photograph above. Sometimes, the choice to change careers will have you feeling like you are the lone tree in the desert. You may feel isolated, alone, and you may feel like the world is watching you (remember me mentioning the psychology of the &#8220;spotlight effect&#8221; earlier?).</p><p>Please know that I don&#8217;t depict these things to scare you. Not at all! I share only in the hopes that you may be prepared for what may lie ahead.</p><p>So, you may be wondering why I mention &#8220;courage, discipline, and perseverance&#8221; in the title of this section. Well, thank you for asking! Let&#8217;s break it down a bit:</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!1A_Z!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F959f8092-f38d-4552-9442-b976fa427b35_800x640.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!1A_Z!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F959f8092-f38d-4552-9442-b976fa427b35_800x640.jpeg 424w, https://substackcdn.com/image/fetch/$s_!1A_Z!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F959f8092-f38d-4552-9442-b976fa427b35_800x640.jpeg 848w, https://substackcdn.com/image/fetch/$s_!1A_Z!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F959f8092-f38d-4552-9442-b976fa427b35_800x640.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!1A_Z!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F959f8092-f38d-4552-9442-b976fa427b35_800x640.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!1A_Z!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F959f8092-f38d-4552-9442-b976fa427b35_800x640.jpeg" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/959f8092-f38d-4552-9442-b976fa427b35_800x640.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:null,&quot;width&quot;:null,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!1A_Z!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F959f8092-f38d-4552-9442-b976fa427b35_800x640.jpeg 424w, https://substackcdn.com/image/fetch/$s_!1A_Z!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F959f8092-f38d-4552-9442-b976fa427b35_800x640.jpeg 848w, https://substackcdn.com/image/fetch/$s_!1A_Z!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F959f8092-f38d-4552-9442-b976fa427b35_800x640.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!1A_Z!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F959f8092-f38d-4552-9442-b976fa427b35_800x640.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a><figcaption class="image-caption">Photo by <a href="https://unsplash.com/@lazycreekimages?utm_source=medium&amp;utm_medium=referral">Michael Dziedzic</a> on&nbsp;<a href="https://unsplash.com?utm_source=medium&amp;utm_medium=referral">Unsplash</a></figcaption></figure></div><h4>Courage</h4><p>The first step in the process was coming to the realization that change was needed, right? Well, I don&#8217;t know about you but I consider that a massive leap of courage. Even if you realized you needed to change careers and didn&#8217;t tell anyone, that&#8217;s still courageous!</p><blockquote><p>Sometimes changing careers means you&#8217;re making a decision to do something that may be hard for people to relate to, and that&#8217;s&nbsp;okay.</p></blockquote><p>&#8220;You&#8217;re quitting your job?&#8221;, &#8220;Why would you walk away from those benefits?&#8221;, &#8220;What do you mean you&#8217;re changing careers, after all those years in college&#8230;?&#8221;</p><p>Maybe it&#8217;s a partner who questions you, or maybe it&#8217;s a spouse or parent, or maybe it&#8217;s simply yourself. Whoever it may be, the questions are inevitable and courage is required to confront those questions, in kind, with honest answers. Courage is required to think about stepping away from what&#8217;s known and into the professional unknown.</p><p>Courage is not an expression, by the way. Courage is something that comes from internal fortitude and strength. That same courage that will propel you to know that change is necessary will be called upon again as you encounter difficulties throughout the change process, for instance:</p><ul><li><p>Networking / reaching out for informational interviews</p></li><li><p>That first interview in a brand new field, with brand new skills</p></li><li><p>Landing that first job and overcoming <a href="https://www.betterup.com/blog/what-is-imposter-syndrome-and-how-to-avoid-it#:~:text=Imposter%20syndrome%20is%20the%20condition,phony%22%20and%20doubting%20their%20abilities.">imposter syndrome</a> (totally a thing, trust me)</p></li></ul><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!kSI5!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd54f54a8-7cab-495b-a2ab-43d41a7ba0bd_800x533.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!kSI5!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd54f54a8-7cab-495b-a2ab-43d41a7ba0bd_800x533.jpeg 424w, https://substackcdn.com/image/fetch/$s_!kSI5!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd54f54a8-7cab-495b-a2ab-43d41a7ba0bd_800x533.jpeg 848w, https://substackcdn.com/image/fetch/$s_!kSI5!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd54f54a8-7cab-495b-a2ab-43d41a7ba0bd_800x533.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!kSI5!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd54f54a8-7cab-495b-a2ab-43d41a7ba0bd_800x533.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!kSI5!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd54f54a8-7cab-495b-a2ab-43d41a7ba0bd_800x533.jpeg" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d54f54a8-7cab-495b-a2ab-43d41a7ba0bd_800x533.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:null,&quot;width&quot;:null,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!kSI5!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd54f54a8-7cab-495b-a2ab-43d41a7ba0bd_800x533.jpeg 424w, https://substackcdn.com/image/fetch/$s_!kSI5!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd54f54a8-7cab-495b-a2ab-43d41a7ba0bd_800x533.jpeg 848w, https://substackcdn.com/image/fetch/$s_!kSI5!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd54f54a8-7cab-495b-a2ab-43d41a7ba0bd_800x533.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!kSI5!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd54f54a8-7cab-495b-a2ab-43d41a7ba0bd_800x533.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a><figcaption class="image-caption">Photo by <a href="https://unsplash.com/@thelowedown?utm_source=medium&amp;utm_medium=referral">Dave Lowe</a> on&nbsp;<a href="https://unsplash.com?utm_source=medium&amp;utm_medium=referral">Unsplash</a></figcaption></figure></div><h4>Discipline</h4><p>I think I mentioned &#8220;stick-to-it-tiveness&#8221; earlier and I&#8217;m fairly certain that&#8217;s a word, but I am doubly-certain that discipline is required in order to achieve a successful career change.</p><p>If you jumping into a completely unrelated field where the learning of new skills is required, then get ready for an oil change of the discipline engine because you want to make sure that baby is running smooth as you get work. Learning new skills, especially after you have been working full-time in a field where skills may feel comfortable to you, takes lots of effort, and you&#8217;ll need to rely on discipline to see you through.</p><p>&#8220;Nathan&#8221;, you may ask, &#8220;why not include &#8216;motivation&#8217; here instead of &#8216;discipline&#8217;?&#8221;</p><p>You know, I&#8217;m not sure why I&#8217;ve stuck with this format of making up questions that made-up readers may ask, but let&#8217;s just keep rolling with it. &#8220;Motivation&#8221; is an extremely powerful thing that can be combined with discipline, yet they are different forces:</p><ul><li><p><a href="https://www.betterup.com/blog/what-is-imposter-syndrome-and-how-to-avoid-it#:~:text=Imposter%20syndrome%20is%20the%20condition,phony%22%20and%20doubting%20their%20abilities.">Motivation</a> = desire; desire carries the potential to be fleeting so is therefore unreliable on a consistent basis</p></li><li><p><a href="https://www.dictionary.com/browse/discipline">Discipline</a> = regimen (definition #2 in the link); your ability to demonstrate specific behaviors consistently over time</p></li></ul><p>The motivation will lift your spirits and have you cruising on the good days. Your discipline will keep your nose in the books or have you filling out job applications on the bad days, when your motivation is low.</p><blockquote><p>If you rely on motivation alone then changing careers will be extraordinarily difficult. By cultivating discipline, you can better set yourself up for success as you transition.</p></blockquote><p>For discipline, I would say here that what&#8217;s important is to really know yourself, first and foremost. What times of day are you most alert/most effective? Do you think going back to school would be best for you, or a different path? What is your tolerance for learning new skills, applying for new jobs, and working your current job at the same time?</p><p>Here, the most important thing is to<strong> try. </strong>By trying different behavior patterns you will learn what activates your brain the most and what does and does not work for you. Do this over time and you will eventually hone a disciplined approach for tackling your career change.</p><p>Speaking of time, this dovetails nicely into my final point, <strong>perseverance.</strong></p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!F0g2!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb7fd16ab-5a7a-46ee-9a2c-eac418dc971c_800x449.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!F0g2!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb7fd16ab-5a7a-46ee-9a2c-eac418dc971c_800x449.jpeg 424w, https://substackcdn.com/image/fetch/$s_!F0g2!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb7fd16ab-5a7a-46ee-9a2c-eac418dc971c_800x449.jpeg 848w, https://substackcdn.com/image/fetch/$s_!F0g2!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb7fd16ab-5a7a-46ee-9a2c-eac418dc971c_800x449.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!F0g2!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb7fd16ab-5a7a-46ee-9a2c-eac418dc971c_800x449.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!F0g2!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb7fd16ab-5a7a-46ee-9a2c-eac418dc971c_800x449.jpeg" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b7fd16ab-5a7a-46ee-9a2c-eac418dc971c_800x449.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:null,&quot;width&quot;:null,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!F0g2!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb7fd16ab-5a7a-46ee-9a2c-eac418dc971c_800x449.jpeg 424w, https://substackcdn.com/image/fetch/$s_!F0g2!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb7fd16ab-5a7a-46ee-9a2c-eac418dc971c_800x449.jpeg 848w, https://substackcdn.com/image/fetch/$s_!F0g2!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb7fd16ab-5a7a-46ee-9a2c-eac418dc971c_800x449.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!F0g2!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb7fd16ab-5a7a-46ee-9a2c-eac418dc971c_800x449.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a><figcaption class="image-caption">Photo by <a href="https://unsplash.com/@jerrykavan?utm_source=medium&amp;utm_medium=referral">Jarom&#237;r Kavan</a> on&nbsp;<a href="https://unsplash.com?utm_source=medium&amp;utm_medium=referral">Unsplash</a></figcaption></figure></div><h4>Perseverance</h4><p>You&#8217;re <strong>courageous</strong>&#8202;&#8212;&#8202;you realized that change was needed and were brave enough to acknowledge that fact.</p><p>You&#8217;re <strong>disciplined</strong>&#8202;&#8212;&#8202;yes, you rode that tidal wave of motivation after realizing that change was needed, but you capitalized on that to craft a disciplined approach for yourself. You&#8217;re chipping away steadily at your goals, making steady progress without overburdening yourself.</p><p>Now&#8230; what do you do?</p><p>Here&#8217;s where our final champion, <strong>perseverance</strong>, steps into the arena.</p><p>The road to changing one&#8217;s career looks different for all of us. For some of us, it&#8217;s a path that takes years, including going back to school, new degrees and new cities. For others, maybe the timeline is shorter but tough decisions still remain part of the career changing game. The process is not any easier or any more difficult based on the factor of time alone.</p><p>Without perseverance, I&#8217;m not sure if myself or anyone I know would have been able to successfully transition into our new careers. Even with the support of my partner my career transition was still extremely difficult. I worked at a steel shop as much as I could while back in school full-time, pursuing additional studies on the side and working full-time in the summers to make my transition as successful as possible. There are individuals I knew through school who did it all themselves with no help from friends or family, and I applaud them to this day for such an effort.</p><p>Just like how you can&#8217;t put all your eggs in the basket of motivation, knowing that motivation will eventually wane, in times where your motivation is lacking you can draw on your <strong>discipline</strong> and <strong>perseverance</strong> to see you through.</p><p><strong><a href="https://positivepsychology.com/perseverance/">Perseverance</a></strong>, by the way, is not simply you thinking positively when times may be tough. Not at all. Your ability to persevere is your ability to see things through in spite of the obstacles that life may throw your way. And, trust me, life has a way of keeping you on your toes!</p><p>I really wish I had a bag of tricks for helping you to build perseverance, but I&#8217;m not sure that I do. And, to be honest with you, I don&#8217;t want to be shallow and share things that I Googled and didn&#8217;t trial myself.</p><blockquote><p>You will, no doubt, know the tough times when they come. Perseverance is when you accept that the tough times are here, take a breath, and then decide to keep moving forward. That is perseverance in&nbsp;action.</p></blockquote><p>Changing my career into tech truly changed my life for the better. If you&#8217;re on the fence about whether or not a career change is right for you and your situation, know that no one else but you can make that decision for you.</p><p>However, <strong>know that change is always possible</strong>. I hope this article was a small step in helping someone.</p><p>If this helped you in any way, please do share with someone you know.</p>]]></content:encoded></item></channel></rss>