116 episodes

Find out what it takes to get your dream cybersecurity job (from the hiring managers' perspective).

Your Cyber Path: How to Get Your Dream Cybersecurity Job Kip Boyle

    • Business
    • 4.7 • 39 Ratings

Find out what it takes to get your dream cybersecurity job (from the hiring managers' perspective).

    EP 116 - What's next after season 2?

    EP 116 - What's next after season 2?

    What's next after season 2?

    About this Episode

    In the grand wrap-up of season two of the podcast 'Your Cyber Path', hosts Kip Boyle and Jason Dion reflect on their four-year podcast journey. They also reveal that for the time being, there won't be a season three as originally planned.

    Several factors have influenced this decision, the primary being their venture Akylade – a cybersecurity certification organization. They're also experiencing increased demand for their time and energy due to factors involving Akylade and other projects. However, they highlight the intention of potentially doing a third season in the future based on the feedback and demand received.

    Kip Boyle will continue to mentor notes but change the frequency from weekly to monthly. Jason Dion urges listeners to check their cybersecurity course, 'Irresistible' on Udemy.

    They greatly encourage listeners to stay in touch and seek guidance on cybersecurity careers through email which is available at yourcyberpath.com.

    Relevant websites for this episode





    • 36 min
    EP 115 - SDP 10: Separation of Privileges

    EP 115 - SDP 10: Separation of Privileges

    SDP 10: Separation of Privileges

    About this Episode

    In this episode of the Your CyberPath podcast, Kip Boyle and Jason Dion delve into the concept of the separation of privilege as a vital component of their series on security architecture and design principles.

    Jason and Kip talk about how the separation of privilege illustrates its significance through real-world examples. They also help showcase its application in technologies, military operations, and financial transactions.

    Jason also draws from his military experience to underscore the critical role of separation of privilege in SOVOT (System Operations Verification and Testing) environments.

    Finally, they underscore its importance in password management systems. They emphasize its pivotal role in upholding cybersecurity standards. Understanding these principles is essential for building robust security frameworks.

    Relevant websites for this episode

    The NIST Separation of Duty (SOD) - https://csrc.nist.gov/glossary/term/separation_of_duty

    Other relevant Episodes

    EP 94: Ten Security Design Principles (SDP)

    EP 96: SDP 1: Least Privilege

    EP 98: Security Design Principles 2: Psychological Acceptability

    EP 101: SDP 3: Economy of Mechanism

    EP 103: SDP 4 Compromise Recording

    EP 105: SDP 5: Work Factor

    EP 107: SDP 6: Failsafe Defaults

    EP 109: SDP 7: Complete Mediation

    EP 111: SDP 8 open Design

    EP 113: SDP 9 — Least Common Mechanism

    • 15 min
    EP 114 - NIST CSF Versus The Top 18

    EP 114 - NIST CSF Versus The Top 18

    About this episode

    In this episode, Kip Boyle and Jason Dion discuss the importance of cybersecurity in the current digital landscape and focus on comparing two different standards: The NIST Cybersecurity Framework and the CIS Top 18.

    The NIST Framework was created to assist organizations in becoming cyber resilient and offers an adaptable and comprehensive approach to cyber risks. The CIS Top 18, on the other hand, provides an actionable and practical checklist of controls that is prioritized and sequenced.

    Both of these frameworks provide us with cybersecurity measures that can be used for different applications. They can be used individually, or they can work together by complementing each other in a comprehensive cybersecurity strategy.

    It is important to realize that the CIS Top 18 can end up being quite expensive for smaller organizations to operate, though, which is why many people are choosing the NIST CSF instead. You should always consider various factors, such as organizational size and specific needs, the type of threats faced, and the budget available for implementation when selecting the framework for your organization.

    Relevant websites for this episode

    The NIST Cyber Security Framework (CSF) - https://www.nist.gov/cyberframework

    The 18 CIS Critical Security Controls - https://www.cisecurity.org/controls/cis-controls-list

    Other Relevant Episodes

    EP 62 – The NIST Cybersecurity Framework

    EP 79 – Mid-Career Transition Success Story with Steve McMichael

    EP 83 – Automating NIST Risk Management Frameowrk with Rebecca Onuskanich

    • 50 min
    EP 113 - SDP 9 Least common Mechanism

    EP 113 - SDP 9 Least common Mechanism

    In this episode, Kip and Jason cover the Security Design Principle of “Least Common Mechanism”.

    The Lease Common Mechanism is the ninth security design principle and focuses on how you can best protect older, legacy systems in large organizations and within the government.

    Security Design Principle #9 is a crucial concept in the field of cybersecurity. It advocates for minimizing the amount of mechanisms shared by different users or processes, thereby reducing the chances of a security breach. This principle is rooted in the idea that shared resources or functionalities can become potential vulnerabilities, especially if they are used by multiple entities with varying levels of trustworthiness.

    The principle is based on the understanding that any shared mechanism or resource is a potential attack surface. When different programs or users rely on the same functionality or data paths, a breach in one can easily become a gateway to compromise the others. For instance, if a shared library has a vulnerability, every program using that library is at risk. Therefore, by reducing the number of shared components, the principle of Least Common Mechanism aims to limit the potential damage that can be caused by a security flaw or breach.

    Implementing this principle involves designing systems where the functionalities are as isolated as possible. This can be achieved through techniques like sandboxing, where programs run in isolated environments, or through the use of microservices architectures, where applications are broken down into smaller, independent services. Each service or program having its unique mechanisms greatly diminishes the risk of a widespread security incident.

    The principle also underlines the importance of not only securing shared resources but also constantly monitoring them. Regular audits and updates of shared components are vital to ensure they remain secure. In essence, the Least Common Mechanism principle is about understanding the risks associated with shared resources and proactively designing systems to minimize these risks.

    Relevant websites for this episode

    Akylade Certified Cyber Resilience Fundamentals (A/CCRF)Your Cyber Path

    Other Relevant Episodes

    Episode 96 – SDP 1 – Least PrivilegeEpisode 98 – SDP 2 – Psychological AcceptabilityEpisode 101 – SDP 3 – Economy of MechanismEpisode 103 – SDP 4 – Compromise RecordingEpisode 105 – SDP 5 – Work FactorEpisode 107 – SDP 6 – Failsafe DefaultsEpisode 109 – SDP 7 – Complete MediationEpisode 111 - SDP 8 – Open Design

    • 13 min
    EP 112 - Listeners' Questions

    EP 112 - Listeners' Questions


    In this episode, Kip and Jason jump into answer questions directly from our listeners!

    We share valuable advice and insights into starting and advancing in the cybersecurity field by addressing ways to overcome some common challenges such as imposter syndrome, applying skills from diverse industries, and filling employment history gaps. 

    Further, you will get some guidance on gaining relevant experience, understanding job roles, tackling age bias, and displaying self-confidence to potential employers. 

    We will then culminate with some valuable tips on overcoming technical skill gaps and making successful career transitions, alongside with coverage of the HIRED course and its transition from a high-cost masterclass to a more accessible Udemy course that anyone can participate in.

    How do I get started in cybersecurity?How can I gain experience?How to I transition into cybersecurity later in life?How do I identify my desired job and current transferrable skills?How should I address a gap in my resume?How can I deal with imposter syndrome?

    Relevant websites for this episode

    Akylade Certified Cyber Resilience Fundamentals (A/CCRF)Your Cyber PathIRRESISTIBLE: How to Land Your Dream Cybersecurity PositionThe Cyber Risk Management Podcast

    Other Relevant Episodes

    Episode 90 - How to Get Your First Job as a Pentester with Chris HornerEpisode 45 - Live Resume ReviewEpisode 24 - How to Navigate a Skill GapEpisode 66 - How to Be Irresistible to Hiring Managers

    • 1 hr 7 min
    EP 111: SDP 8 Open Design

    EP 111: SDP 8 Open Design


    In this episode, Kip and Jason delve into the specific security design principle of Open Design.

    Open Design does not equate to open-source software but refers to transparency in revealing the mechanisms and inner workings of security controls.

    The hosts discuss the misconceptions surrounding Open Design, emphasizing that it does not require disclosing source code but rather the transparency of security mechanisms. They also stress that Open Design encourages outsiders to review and provide feedback, ultimately enhancing the security of the system.

    Kip shares an example of an inadequate disclosure of a company’s security architecture which prompted him to switch to another vendor, which offered more transparency.

    Jason mentions the concept of "security by obscurity," and explains that while obscurity can provide some level of protection, it is not sufficient, as attackers can easily bypass such measures with scanning tools.

    The hosts suggest that getting involved in Open Design initiatives can help individuals break into the cybersecurity field and gain recognition, urging interested parties to participate in open standards development processes, such as the creation of industry certifications, to establish credibility and build their careers.

    What You’ll Learn

    ●    What is open design?

    ●    What are the common misconceptions surrounding open design?

    ●     What does the concept of “security by obscurity” mean?

    ●     How can you break into cybersecurity with open design?

    Relevant Websites For This Episode

    ●    Akylade Certified Cyber Resilience Fundamentals (A/CCRF)

    ●  Your Cyber Path

    ●  IRRESISTIBLE: How to Land Your Dream Cybersecurity Position

    ●  The Cyber Risk Management Podcast

    Other Relevant Episodes

    ●   Episode 92 - Password Managers

    ●   Episode 89 - Getting My First Job in Cybersecurity

    ●   Episode 82 - From Truck Driver to Cybersecurity Analyst

    • 21 min

Customer Reviews

4.7 out of 5
39 Ratings

39 Ratings

Swampfox_01 ,

Fantastic Podcast!

A very informative and useful podcast. I started at episode 1 and am currently on episode 83. I highly recommend this podcast for anyone looking to get into the Cybersecurity field.

New2Cyber2 ,

Great podcast! Must listen if considering a career in Cyber!

Jason and Skip do a great job on this podcast. They bring a lot of experience and knowledge that is extremely informational and useful. I am so glad I found this podcast. Do yourself a favor, subscribe, listen and apply the wisdom and advice they share. Thank you Jason and Skip!

tk421mesa ,

Extraordinarily Helpful

This podcast has been profoundly helpful for me as a noob in the IT industry. Thank you for sharing your career navigation expertise—and that of your show’s guests.

Top Podcasts In Business

The Ramsey Show
Ramsey Network
REAL AF with Andy Frisella
Andy Frisella #100to0
Money Rehab with Nicole Lapin
Money News Network
The Dough
Lemonada Media
Think Fast, Talk Smart: Communication Techniques
Stanford GSB
The Prof G Pod with Scott Galloway
Vox Media Podcast Network

You Might Also Like

CyberWire Daily
N2K Networks
Cyber Security Headlines
CISO Series
Darknet Diaries
Jack Rhysider
The Daily
The New York Times