Your Cyber Path: How to Get Your Dream Cybersecurity Job
Your Cyber Path: How to Get Your Dream Cybersecurity Job

Your Cyber Path: How to Get Your Dream Cybersecurity Job

Kip Boyle

Overview
Episodes

Details

Find out what it takes to get your dream cybersecurity job (from the hiring managers' perspective).

Recent Episodes

EP 116 - What's next after season 2?
FEB 16, 2024
play-circle icon
36 MIN
EP 115 - SDP 10: Separation of Privileges
FEB 6, 2024
EP 115 - SDP 10: Separation of Privileges
<p>SDP 10: Separation of Privileges</p> <p><b>About this Episode</b></p> <p>In this episode of the Your CyberPath podcast, Kip Boyle and Jason Dion delve into the concept of the separation of privilege as a vital component of their series on security architecture and design principles.</p> <p>Jason and Kip talk about how the separation of privilege illustrates its significance through real-world examples. They also help showcase its application in technologies, military operations, and financial transactions. </p> <p>Jason also draws from his military experience to underscore the critical role of separation of privilege in SOVOT (System Operations Verification and Testing) environments. </p> <p>Finally, they underscore its importance in password management systems. They emphasize its pivotal role in upholding cybersecurity standards. Understanding these principles is essential for building robust security frameworks.</p> <p><b>Relevant websites for this episode</b></p> <p>The NIST Separation of Duty (SOD) - https://csrc.nist.gov/glossary/term/separation_of_duty</p> <p><b>Other relevant Episodes</b></p> <p>EP 94: Ten Security Design Principles (SDP)</p> <p>EP 96: SDP 1: Least Privilege</p> <p>EP 98: Security Design Principles 2: Psychological Acceptability</p> <p>EP 101: SDP 3: Economy of Mechanism</p> <p>EP 103: SDP 4 Compromise Recording</p> <p>EP 105: SDP 5: Work Factor</p> <p>EP 107: SDP 6: Failsafe Defaults</p> <p>EP 109: SDP 7: Complete Mediation</p> <p>EP 111: SDP 8 open Design</p> <p>EP 113: SDP 9 — Least Common Mechanism</p>
play-circle icon
15 MIN
 EP 114 - NIST CSF Versus The Top 18
JAN 19, 2024
EP 114 - NIST CSF Versus The Top 18
<p><b>About this episode</b></p> <p>In this episode, Kip Boyle and Jason Dion discuss the importance of cybersecurity in the current digital landscape and focus on comparing two different standards: The NIST Cybersecurity Framework and the CIS Top 18.</p> <p>The NIST Framework was created to assist organizations in becoming cyber resilient and offers an adaptable and comprehensive approach to cyber risks. The CIS Top 18, on the other hand, provides an actionable and practical checklist of controls that is prioritized and sequenced.</p> <p>Both of these frameworks provide us with cybersecurity measures that can be used for different applications. They can be used individually, or they can work together by complementing each other in a comprehensive cybersecurity strategy.</p> <p>It is important to realize that the CIS Top 18 can end up being quite expensive for smaller organizations to operate, though, which is why many people are choosing the NIST CSF instead. You should always consider various factors, such as organizational size and specific needs, the type of threats faced, and the budget available for implementation when selecting the framework for your organization.</p> <p><b>Relevant websites for this episode</b></p> <p>The NIST Cyber Security Framework (CSF) - <a href="https://www.nist.gov/cyberframework" target="_blank">https://www.nist.gov/cyberframework</a></p> <p>The 18 CIS Critical Security Controls - <a href="https://www.cisecurity.org/controls/cis-controls-list" target="_blank">https://www.cisecurity.org/controls/cis-controls-list</a></p> <p><br /></p> <p><b>Other Relevant Episodes</b></p> <p>EP 62 – The NIST Cybersecurity Framework</p> <p>EP 79 – Mid-Career Transition Success Story with Steve McMichael</p> <p>EP 83 – Automating NIST Risk Management Frameowrk with Rebecca Onuskanich</p>
play-circle icon
50 MIN
EP 113 - SDP 9 Least common Mechanism
JAN 5, 2024
EP 113 - SDP 9 Least common Mechanism
<p>In this episode, Kip and Jason cover the Security Design Principle of “Least Common Mechanism”.</p> <p>The Lease Common Mechanism is the ninth security design principle and focuses on how you can best protect older, legacy systems in large organizations and within the government.</p> <p>Security Design Principle #9 is a crucial concept in the field of cybersecurity. It advocates for minimizing the amount of mechanisms shared by different users or processes, thereby reducing the chances of a security breach. This principle is rooted in the idea that shared resources or functionalities can become potential vulnerabilities, especially if they are used by multiple entities with varying levels of trustworthiness.</p> <p>The principle is based on the understanding that any shared mechanism or resource is a potential attack surface. When different programs or users rely on the same functionality or data paths, a breach in one can easily become a gateway to compromise the others. For instance, if a shared library has a vulnerability, every program using that library is at risk. Therefore, by reducing the number of shared components, the principle of Least Common Mechanism aims to limit the potential damage that can be caused by a security flaw or breach.</p> <p>Implementing this principle involves designing systems where the functionalities are as isolated as possible. This can be achieved through techniques like sandboxing, where programs run in isolated environments, or through the use of microservices architectures, where applications are broken down into smaller, independent services. Each service or program having its unique mechanisms greatly diminishes the risk of a widespread security incident.</p> <p>The principle also underlines the importance of not only securing shared resources but also constantly monitoring them. Regular audits and updates of shared components are vital to ensure they remain secure. In essence, the Least Common Mechanism principle is about understanding the risks associated with shared resources and proactively designing systems to minimize these risks.</p> <p>Relevant websites for this episode</p> <ul><li><a href="https://www.akylade.com/accrf" target="_blank"><b>Akylade Certified Cyber Resilience Fundamentals (A/CCRF)</b></a></li><li><a href="https://www.yourcyberpath.com/podcasts/" target="_blank"><b>Your Cyber Path</b></a></li></ul> <p><b>Other Relevant Episodes</b></p> <ul><li>Episode 96 – SDP 1 – Least Privilege</li><li>Episode 98 – SDP 2 – Psychological Acceptability</li><li>Episode 101 – SDP 3 – Economy of Mechanism</li><li>Episode 103 – SDP 4 – Compromise Recording</li><li>Episode 105 – SDP 5 – Work Factor</li><li>Episode 107 – SDP 6 – Failsafe Defaults</li><li>Episode 109 – SDP 7 – Complete Mediation</li><li>Episode 111 - SDP 8 – Open Design</li></ul>
play-circle icon
13 MIN
EP 112 - Listeners' Questions
DEC 22, 2023
EP 112 - Listeners' Questions
<p><a href="https://www.yourcyberpath.com/112/" target="_blank">https://www.yourcyberpath.com/112/</a></p> <p>In this episode, Kip and Jason jump into answer questions directly from our listeners!</p> <p>We share valuable advice and insights into starting and advancing in the cybersecurity field by addressing ways to overcome some common challenges such as imposter syndrome, applying skills from diverse industries, and filling employment history gaps. </p> <p>Further, you will get some guidance on gaining relevant experience, understanding job roles, tackling age bias, and displaying self-confidence to potential employers. </p> <p>We will then culminate with some valuable tips on overcoming technical skill gaps and making successful career transitions, alongside with coverage of the HIRED course and its transition from a high-cost masterclass to a more accessible Udemy course that anyone can participate in.</p> <ul><li>How do I get started in cybersecurity?</li><li>How can I gain experience?</li><li>How to I transition into cybersecurity later in life?</li><li>How do I identify my desired job and current transferrable skills?</li><li>How should I address a gap in my resume?</li><li>How can I deal with imposter syndrome?</li></ul> <p>Relevant websites for this episode</p> <ul><li><a href="https://www.akylade.com/accrf" target="_blank">Akylade Certified Cyber Resilience Fundamentals (A/CCRF)</a></li><li><a href="https://www.yourcyberpath.com/podcasts/" target="_blank">Your Cyber Path</a></li><li><a href="https://www.udemy.com/course/irresistible-cybersecurity/" target="_blank">IRRESISTIBLE: How to Land Your Dream Cybersecurity Position</a></li><li><a href="https://www.cyberriskopportunities.com/cyber-risk-resources/cyber-risk-management-podcast/" target="_blank">The Cyber Risk Management Podcast</a></li></ul> <p><b>Other Relevant Episodes</b></p> <ul><li><a href="https://www.yourcyberpath.com/90" target="_blank">Episode 90 - How to Get Your First Job as a Pentester with Chris Horner</a></li><li><a href="https://www.yourcyberpath.com/45" target="_blank">Episode 45 - Live Resume Review</a></li><li><a href="https://www.yourcyberpath.com/24" target="_blank">Episode 24 - How to Navigate a Skill Gap</a></li><li><a href="https://www.yourcyberpath.com/66" target="_blank">Episode 66 - How to Be Irresistible to Hiring Managers</a></li></ul> <p><br /></p>
play-circle icon
67 MIN