Your Cyber Path: How to Get Your Dream Cybersecurity Job

Kip Boyle
Your Cyber Path: How to Get Your Dream Cybersecurity Job Podcast

Find out what it takes to get your dream cybersecurity job (from the hiring managers' perspective).

  1. 19 JAN

    EP 114 - NIST CSF Versus The Top 18

    About this episode In this episode, Kip Boyle and Jason Dion discuss the importance of cybersecurity in the current digital landscape and focus on comparing two different standards: The NIST Cybersecurity Framework and the CIS Top 18. The NIST Framework was created to assist organizations in becoming cyber resilient and offers an adaptable and comprehensive approach to cyber risks. The CIS Top 18, on the other hand, provides an actionable and practical checklist of controls that is prioritized and sequenced. Both of these frameworks provide us with cybersecurity measures that can be used for different applications. They can be used individually, or they can work together by complementing each other in a comprehensive cybersecurity strategy. It is important to realize that the CIS Top 18 can end up being quite expensive for smaller organizations to operate, though, which is why many people are choosing the NIST CSF instead. You should always consider various factors, such as organizational size and specific needs, the type of threats faced, and the budget available for implementation when selecting the framework for your organization. Relevant websites for this episode The NIST Cyber Security Framework (CSF) - https://www.nist.gov/cyberframework The 18 CIS Critical Security Controls - https://www.cisecurity.org/controls/cis-controls-list Other Relevant Episodes EP 62 – The NIST Cybersecurity Framework EP 79 – Mid-Career Transition Success Story with Steve McMichael EP 83 – Automating NIST Risk Management Frameowrk with Rebecca Onuskanich

    50 min
  2. 5 JAN

    EP 113 - SDP 9 Least common Mechanism

    In this episode, Kip and Jason cover the Security Design Principle of “Least Common Mechanism”. The Lease Common Mechanism is the ninth security design principle and focuses on how you can best protect older, legacy systems in large organizations and within the government. Security Design Principle #9 is a crucial concept in the field of cybersecurity. It advocates for minimizing the amount of mechanisms shared by different users or processes, thereby reducing the chances of a security breach. This principle is rooted in the idea that shared resources or functionalities can become potential vulnerabilities, especially if they are used by multiple entities with varying levels of trustworthiness. The principle is based on the understanding that any shared mechanism or resource is a potential attack surface. When different programs or users rely on the same functionality or data paths, a breach in one can easily become a gateway to compromise the others. For instance, if a shared library has a vulnerability, every program using that library is at risk. Therefore, by reducing the number of shared components, the principle of Least Common Mechanism aims to limit the potential damage that can be caused by a security flaw or breach. Implementing this principle involves designing systems where the functionalities are as isolated as possible. This can be achieved through techniques like sandboxing, where programs run in isolated environments, or through the use of microservices architectures, where applications are broken down into smaller, independent services. Each service or program having its unique mechanisms greatly diminishes the risk of a widespread security incident. The principle also underlines the importance of not only securing shared resources but also constantly monitoring them. Regular audits and updates of shared components are vital to ensure they remain secure. In essence, the Least Common Mechanism principle is about understanding the risks associated with shared resources and proactively designing systems to minimize these risks. Relevant websites for this episode Akylade Certified Cyber Resilience Fundamentals (A/CCRF)Your Cyber Path Other Relevant Episodes Episode 96 – SDP 1 – Least PrivilegeEpisode 98 – SDP 2 – Psychological AcceptabilityEpisode 101 – SDP 3 – Economy of MechanismEpisode 103 – SDP 4 – Compromise RecordingEpisode 105 – SDP 5 – Work FactorEpisode 107 – SDP 6 – Failsafe DefaultsEpisode 109 – SDP 7 – Complete MediationEpisode 111 - SDP 8 – Open Design

    14 min
  3. 22/12/2023

    EP 112 - Listeners' Questions

    https://www.yourcyberpath.com/112/ In this episode, Kip and Jason jump into answer questions directly from our listeners! We share valuable advice and insights into starting and advancing in the cybersecurity field by addressing ways to overcome some common challenges such as imposter syndrome, applying skills from diverse industries, and filling employment history gaps.  Further, you will get some guidance on gaining relevant experience, understanding job roles, tackling age bias, and displaying self-confidence to potential employers.  We will then culminate with some valuable tips on overcoming technical skill gaps and making successful career transitions, alongside with coverage of the HIRED course and its transition from a high-cost masterclass to a more accessible Udemy course that anyone can participate in. How do I get started in cybersecurity?How can I gain experience?How to I transition into cybersecurity later in life?How do I identify my desired job and current transferrable skills?How should I address a gap in my resume?How can I deal with imposter syndrome? Relevant websites for this episode Akylade Certified Cyber Resilience Fundamentals (A/CCRF)Your Cyber PathIRRESISTIBLE: How to Land Your Dream Cybersecurity PositionThe Cyber Risk Management Podcast Other Relevant Episodes Episode 90 - How to Get Your First Job as a Pentester with Chris HornerEpisode 45 - Live Resume ReviewEpisode 24 - How to Navigate a Skill GapEpisode 66 - How to Be Irresistible to Hiring Managers

    1h 7m
  4. 08/12/2023

    EP 111: SDP 8 Open Design

    https://www.yourcyberpath.com/111/ In this episode, Kip and Jason delve into the specific security design principle of Open Design. Open Design does not equate to open-source software but refers to transparency in revealing the mechanisms and inner workings of security controls. The hosts discuss the misconceptions surrounding Open Design, emphasizing that it does not require disclosing source code but rather the transparency of security mechanisms. They also stress that Open Design encourages outsiders to review and provide feedback, ultimately enhancing the security of the system. Kip shares an example of an inadequate disclosure of a company’s security architecture which prompted him to switch to another vendor, which offered more transparency. Jason mentions the concept of "security by obscurity," and explains that while obscurity can provide some level of protection, it is not sufficient, as attackers can easily bypass such measures with scanning tools. The hosts suggest that getting involved in Open Design initiatives can help individuals break into the cybersecurity field and gain recognition, urging interested parties to participate in open standards development processes, such as the creation of industry certifications, to establish credibility and build their careers. What You’ll Learn ●    What is open design? ●    What are the common misconceptions surrounding open design? ●     What does the concept of “security by obscurity” mean? ●     How can you break into cybersecurity with open design? Relevant Websites For This Episode ●    Akylade Certified Cyber Resilience Fundamentals (A/CCRF) ●  Your Cyber Path ●  IRRESISTIBLE: How to Land Your Dream Cybersecurity Position ●  The Cyber Risk Management Podcast Other Relevant Episodes ●   Episode 92 - Password Managers ●   Episode 89 - Getting My First Job in Cybersecurity ●   Episode 82 - From Truck Driver to Cybersecurity Analyst

    22 min
  5. 24/11/2023

    EP 110: Am I too old to work in Cybersecurity

    https://www.yourcyberpath.com/110/ In this episode, hosts Kip Boyle and Jason Dion discuss the topic of ageism in cybersecurity careers. They address a listener's question about whether it is too late for a career change into cybersecurity at the age of 60-65. The hosts acknowledge that ageism does exist in the industry, but they provide tips and strategies for older individuals to overcome this challenge. First, they advise career changers to identify their transferable skills and highlight them on their resumes. They also recommend choosing job titles carefully, avoiding entry-level positions that may be more suited for younger candidates. Instead, older individuals should target higher-level positions that align with their experience and expertise. The hosts also discuss the importance of addressing ageism during the interview process. They suggest talking about new technologies and demonstrating a willingness to adapt and embrace change. Additionally, they advise older candidates to choose employers wisely, considering organizations that value and appreciate the skills and experience they bring to the table. Overall, the episode provides practical advice for older individuals looking to transition into cybersecurity careers and navigate the challenges of ageism in the industry. What You’ll Learn ●    Am I too old to do a career change into cybersecurity? ●   What are some strategies to overcome age-related challenges when pursuing a career change into cybersecurity? ●    Should I highlight my transferable skills when changing careers? ●    What should older individuals consider when targeting job positions in the cybersecurity field? Relevant Websites For This Episode ●    Akylade Certified Cyber Resilience Fundamentals (A/CCRF) ●  Your Cyber Path ●  IRRESISTIBLE: How to Land Your Dream Cybersecurity Position ●  The Cyber Risk Management Podcast Other Relevant Episodes ●  Episode 64 - How I got my first cybersecurity analyst job with Sebastian Whiting ●  Episode 66 - How to be irresistible to hiring Managers ●  Episode 38 -  Wes’ Cybersecurity Job Hunt

    34 min
  6. 10/11/2023

    EP 109: SDP 7: Complete Mediation

    https://www.yourcyberpath.com/109/ In this episode, we are returning to the Security Design Principles series, this time with Complete Mediation. Complete mediation means the system checks the user trying to access a file or perform an action is authorized to access this file or perform this action. Complete mediation is also implemented in the security reference monitor (SRM) in Windows operating systems. The SRM checks fully and completely that a user has access to perform an action each time they try to perform it. It also ties back to one of the three As of cybersecurity, which is Authorization, since the user has to prove having access to something when they request it. Complete mediation can be a huge challenge to usability, and it might be something that interferes with your operations. That’s where you need to understand that the security design principles are not a compliance list and that you should use them to enhance your systems. You should not be trying to get every principle to 100%. What You’ll Learn ●    What is complete mediation? ●    What are some examples of complete mediation? ●     How is complete mediation implemented in Windows? ●     What are the challenges of complete mediation? Relevant Websites For This Episode ●    Akylade Certified Cyber Resilience Fundamentals (A/CCRF) ●  Your Cyber Path ●  IRRESISTIBLE: How to Land Your Dream Cybersecurity Position ●  The Cyber Risk Management Podcast Other Relevant Episodes ●  Episode 103 - SDP 4: Compromise Recording ●  Episode 105 - SDB 5: Work Factor ●  Episode 107 -  SDP 6: Failsafe Defaults

    21 min

About

Find out what it takes to get your dream cybersecurity job (from the hiring managers' perspective).

You Might Also Like

To listen to explicit episodes, sign in.

Stay up to date with this show

Sign in or sign up to follow shows, save episodes and get the latest updates.

Select a country or region

Africa, Middle East, and India

Asia Pacific

Europe

Latin America and the Caribbean

The United States and Canada