Cybersecurity Panel Notes
Section 1
Data is IMPORTANT, and must be handled properly and old data must be taken care of.
Anecdote: one individual went on a work leave and was stealing company data in order to solve his financial issues. Advice is to stay curious and be wary of everything because it may be a cybersecurity threat.
Mr. Tomasz is very good at ransomware, but adversary threats are a bigger threat. China and other major adversaries are a major concern for the cybersecurity industry.
Mr. Nzeata says that in order to be more defensive, we need to be more educated about the field of cybersecurity and be aware of phishing in office settings. Many people are susceptible for phishing attacks despite efforts to educate cybersecurity.
Mr. Nzeata mentions several zero-days that cause harm for many countries
“To know good you must now evil”: Knowing how to attack a system (ethical hacking) is super important because it allows everyone to truly test the security of a system.
Legal concern: if you are responsible for an attack or potential attack, you can face some legal consequences.
Section 2
If you are getting a job in cybersecurity, how can you get involved?
Studying computer science is super important, and starting at a young age is important because you can get involved early + gain more experience.
Anybody can go about learning about computers, its very doable for everyone, as long as you care about it enough.
Many similarities between cybersecurity and working in the armed forces. It is an ever-changing field because of new zero-days and changing fields.
Getting a foundation in IT is very important because it allows us to get a strong foundational background
SOFT-SKILLS - be sociable, be a good leader, be likable. This is super important because it raises the ceiling of what you can do.
Be curious, build your own network, get hired as an intern. Learn in real-world scenarios w/ hack-a-thons.
Go out of your comfort zone to learn quickly, and adapt.
If you see something, say something to law enforcement, even for cybersecurity issues.
Cybersecurity is a great field, but the people are what make this field great and engaging.
Section 3
The future of cyber and the job market in the future
In the next 5-10 years, more specific specializations will start to exist. For example, more people specialized in AI or Healthcare IT. We need to educate the current IT workforce to have the current skill set compared to IT.
AI is a classic example of specialization. AI is a big example of this.
Lots of govt. jobs will be created to defend against the very strong adversaries in China, NK, and Iran. They are stronger than us and we need to get very good at this. The govt. also needs to support small businesses that have about only one cyber security specialist.
AI creates more unknowns and question marks for the future of cyber security.
A network is needed to be valuable in the job market. Having connections will help us learn and be successful.
You are never “done” when you are working in cyber or CS. If you want to be the best, you need to constantly advance in your field of specialization.
Cybersecurity is a team sport - you need to be able to collaborate effectively.
tl;dr (Key Takeaways)
- Data Security: Handle data responsibly; old data must be managed. Be vigilant about potential cybersecurity threats, including insider threats.
- Threat Landscape: Ransomware is significant, but adversary threats (e.g., from China) are a bigger concern. Awareness of phishing and zero-days is critical.
- Ethical Hacking: Understanding how to attack systems is vital for testing security. Legal consequences exist for mishandling cybersecurity responsibilities.
- Career in Cybersecurity: Start early, build IT foundations, and develop soft skills (e.g., leadership, sociability). Gain real-world experience through internships and hackathons.
- Future Trends: Specializations (e.g., AI, Healthcare IT) will grow. Government jobs will increase to counter strong adversaries. Networking and continuous learning are essential.
-
Collaboration: Cybersecurity is a team effort; effective collaboration is key.
- Start with a lab environment, then learn to apply creativity.
- Nmap
- dirbuster
- Kali Linux Installed tools Those are the tools that hackers are using. Use them too. Play around with it on
ISC2 CC is a good foundational cyber security certification.
Group projects are VALUABLE. It is important to learn to deal with a bad group member. The best way to deal with frustrating people is to deal with frustrating people.
Most exploits that have been hypothesized are not able to get off the ground. The majority is not easily done. It usually requires tons of experience and effort.
Patches are only useful if they are able to remediate in a day. If not, severe damage has been done.
How to get involved? attend conferences, and stay in the loop of cyber security.
