<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet href="https://feeds.captivate.fm/style.xsl" type="text/xsl"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:podcast="https://podcastindex.org/namespace/1.0"><channel><atom:link href="https://feeds.captivate.fm/getting-into-infosec/" rel="self" type="application/rss+xml"/><title><![CDATA[Getting Into Infosec]]></title><podcast:guid>0656c615-5ede-5c47-8785-a65ad5489f38</podcast:guid><lastBuildDate>Fri, 31 May 2024 19:02:20 +0000</lastBuildDate><generator>Captivate.fm</generator><language><![CDATA[en]]></language><copyright><![CDATA[Ayman Elsawah (@coffeewithayman)]]></copyright><managingEditor>Ayman Elsawah</managingEditor><itunes:summary><![CDATA[Interviews with people who have transitioned and got jobs in #infosec and #cybersecurity so you can learn and be inspired from their experience. There is no linear path into the field of Information Security, so the hope is that you will resonate with at least one of the guests. Some of my guests were teachers, paralegals, librarians, military vets, developers, and IT help desk techs (to name a few) before transitioning. Also featuring "spoof" ads poking fun at the industry.]]></itunes:summary><image><url>https://artwork.captivate.fm/22ebac58-c190-4252-bf19-b262caab0ad2/image.jpg</url><title>Getting Into Infosec</title><link><![CDATA[https://www.gettingintoinfosec.com/]]></link></image><itunes:image href="https://artwork.captivate.fm/22ebac58-c190-4252-bf19-b262caab0ad2/image.jpg"/><itunes:owner><itunes:name>Ayman Elsawah</itunes:name></itunes:owner><itunes:author>Ayman Elsawah</itunes:author><description>Interviews with people who have transitioned and got jobs in #infosec and #cybersecurity so you can learn and be inspired from their experience. There is no linear path into the field of Information Security, so the hope is that you will resonate with at least one of the guests. Some of my guests were teachers, paralegals, librarians, military vets, developers, and IT help desk techs (to name a few) before transitioning. Also featuring &quot;spoof&quot; ads poking fun at the industry.</description><link>https://www.gettingintoinfosec.com/</link><atom:link href="https://pubsubhubbub.appspot.com" rel="hub"/><itunes:subtitle><![CDATA[Interviews with people who have transitioned and got jobs in #infosec and #cybersecurity so you can learn and be inspired from their experience.]]></itunes:subtitle><itunes:explicit>false</itunes:explicit><itunes:type>episodic</itunes:type><itunes:category text="Business"><itunes:category text="Careers"/></itunes:category><itunes:category text="Education"><itunes:category text="How To"/></itunes:category><itunes:category text="Technology"></itunes:category><itunes:new-feed-url>https://feeds.captivate.fm/getting-into-infosec/</itunes:new-feed-url><podcast:locked>no</podcast:locked><podcast:medium>podcast</podcast:medium><podcast:funding url="https://getting-into-infosec.captivate.fm/support">Support the show!</podcast:funding><item><title>DEFCON 2023</title><itunes:title>DEFCON 2023</itunes:title><description><![CDATA[<p>Hey folks, I'll be at DEF CON in Vegas this year! Would love to see you all there!</p><ul><li><br></li><li>Jack's Parties: <a href="https://twitter.com/JackRhysider/status/1686785376327987200" rel="noopener noreferrer" target="_blank">https://twitter.com/JackRhysider/status/1686785376327987200</a></li><li>Checkout Miscreants at the Vendor Area: <a href="https://www.miscreants.com/" rel="noopener noreferrer" target="_blank">https://www.miscreants.com/</a></li><li><br></li></ul><br/><p>yFDrTl54ZSu3KAmLWbmi</p><p>Mentioned in this episode:</p><p><a href="https://getting-into-infosec.captivate.fm/stayintouch">Stay In Touch</a></p>]]></description><content:encoded><![CDATA[<p>Hey folks, I'll be at DEF CON in Vegas this year! Would love to see you all there!</p><ul><li><br></li><li>Jack's Parties: <a href="https://twitter.com/JackRhysider/status/1686785376327987200" rel="noopener noreferrer" target="_blank">https://twitter.com/JackRhysider/status/1686785376327987200</a></li><li>Checkout Miscreants at the Vendor Area: <a href="https://www.miscreants.com/" rel="noopener noreferrer" target="_blank">https://www.miscreants.com/</a></li><li><br></li></ul><br/><p>yFDrTl54ZSu3KAmLWbmi</p><p>Mentioned in this episode:</p><p><a href="https://getting-into-infosec.captivate.fm/stayintouch">Stay In Touch</a></p>]]></content:encoded><link><![CDATA[https://getting-into-infosec.captivate.fm/episode/defcon-2023]]></link><guid isPermaLink="false">81fc3ea5-440c-48ec-8ae0-b053007a7b06</guid><itunes:image href="https://artwork.captivate.fm/a3c25b5f-b066-420d-a6cd-132fc1bca09b/image.jpg"/><dc:creator><![CDATA[Ayman Elsawah]]></dc:creator><pubDate>Thu, 03 Aug 2023 07:32:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/d9981325-523e-4b2c-a141-f0947dd2f7b2/audio.mp3" length="5337204" type="audio/mpeg"/><itunes:duration>05:34</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>bonus</itunes:episodeType><itunes:author>Ayman Elsawah</itunes:author></item><item><title>Rana Khalil - From Cryptography to Pentester!</title><itunes:title>Rana Khalil - From Cryptography to Pentester!</itunes:title><description><![CDATA[<p>Journey into Cybersecurity and OSCP Certification with Rana Khalil</p><p>This episode features Rana Khalil, a Senior Cybersecurity Assessment Analyst with a rich background in pen-testing, especially in the financial sector. Rana shares her non-traditional entry into technology, starting with a dislike for her first laptop and phone, transitioning from biochemistry to a math degree, and eventually finding a passion in computer science, leading her to cryptography and cybersecurity. Her academic journey includes significant work in cryptography, under the tutelage of Carlisle Adams, and a master’s project on web application vulnerability scanners. Rana discusses her motivation and relentless pursuit of the OSCP certification, highlighting the importance of hands-on experience, teaching, and documenting the learning process through write-ups. She also conveys the value of previous experience in related fields, the significance of specializing and pacing in learning, and shares insights into her career progression, including valuable advice for people aspiring to enter the cybersecurity field.</p><p>00:00 Introduction and Guest Background</p><p>01:47 Rana's Journey into Cybersecurity</p><p>02:45 Rana's Early Interest in Mathematics and Cryptography</p><p>05:47 Transition into Computer Science and Web Security</p><p>10:52 Master's Research on Web Application Vulnerability Scanners</p><p>13:02 First Security Job and the Impact of Public Speaking</p><p>15:11 Journey to the OSCP Certification</p><p>17:36 The Value of Self-Study and Accountability</p><p>18:53 Reflections on the OSCP Experience</p><p>20:59 Understanding the OCP Exam</p><p>21:13 The Importance of Lab Time</p><p>22:18 The Value of Documenting Your Journey</p><p>22:49 Introduction to the OSWE Certification</p><p>25:07 The Role of Experience in Security</p><p>25:16 The Life of a Security Professional</p><p>25:25 The Importance of Specialization in Security</p><p>26:24 The Value of Previous Experience in Security</p><p>29:55 The Challenges and Rewards of Pen Testing</p><p>30:43 The Balance of Work and Personal Time in Security</p><p>34:58 The Importance of Focusing on One Area in Security</p><p>37:07 The Importance of Understanding Source Code</p><p>38:11 Final Thoughts and Advice</p><p><strong>Thank you for listening!</strong></p><p><br></p><p>Mentioned in this episode:</p><p><a href="https://getting-into-infosec.captivate.fm/stayintouch">Stay In Touch</a></p>]]></description><content:encoded><![CDATA[<p>Journey into Cybersecurity and OSCP Certification with Rana Khalil</p><p>This episode features Rana Khalil, a Senior Cybersecurity Assessment Analyst with a rich background in pen-testing, especially in the financial sector. Rana shares her non-traditional entry into technology, starting with a dislike for her first laptop and phone, transitioning from biochemistry to a math degree, and eventually finding a passion in computer science, leading her to cryptography and cybersecurity. Her academic journey includes significant work in cryptography, under the tutelage of Carlisle Adams, and a master’s project on web application vulnerability scanners. Rana discusses her motivation and relentless pursuit of the OSCP certification, highlighting the importance of hands-on experience, teaching, and documenting the learning process through write-ups. She also conveys the value of previous experience in related fields, the significance of specializing and pacing in learning, and shares insights into her career progression, including valuable advice for people aspiring to enter the cybersecurity field.</p><p>00:00 Introduction and Guest Background</p><p>01:47 Rana's Journey into Cybersecurity</p><p>02:45 Rana's Early Interest in Mathematics and Cryptography</p><p>05:47 Transition into Computer Science and Web Security</p><p>10:52 Master's Research on Web Application Vulnerability Scanners</p><p>13:02 First Security Job and the Impact of Public Speaking</p><p>15:11 Journey to the OSCP Certification</p><p>17:36 The Value of Self-Study and Accountability</p><p>18:53 Reflections on the OSCP Experience</p><p>20:59 Understanding the OCP Exam</p><p>21:13 The Importance of Lab Time</p><p>22:18 The Value of Documenting Your Journey</p><p>22:49 Introduction to the OSWE Certification</p><p>25:07 The Role of Experience in Security</p><p>25:16 The Life of a Security Professional</p><p>25:25 The Importance of Specialization in Security</p><p>26:24 The Value of Previous Experience in Security</p><p>29:55 The Challenges and Rewards of Pen Testing</p><p>30:43 The Balance of Work and Personal Time in Security</p><p>34:58 The Importance of Focusing on One Area in Security</p><p>37:07 The Importance of Understanding Source Code</p><p>38:11 Final Thoughts and Advice</p><p><strong>Thank you for listening!</strong></p><p><br></p><p>Mentioned in this episode:</p><p><a href="https://getting-into-infosec.captivate.fm/stayintouch">Stay In Touch</a></p>]]></content:encoded><link><![CDATA[https://getting-into-infosec.captivate.fm/episode/rana-khalil-from-cryptography-to-pentester]]></link><guid isPermaLink="false">126294d2-38da-46fd-bbf3-ae5500a9c582</guid><itunes:image href="https://artwork.captivate.fm/a4810f73-e583-4366-8f99-3d05f5c4a1c6/image.jpg"/><dc:creator><![CDATA[Ayman Elsawah]]></dc:creator><pubDate>Fri, 11 Mar 2022 10:50:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/75db0600-cbd6-4188-b50a-22940afa0712/audio.mp3" length="37955192" type="audio/mpeg"/><itunes:duration>39:32</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>43</itunes:episode><podcast:episode>43</podcast:episode><itunes:summary>Rana is a senior cybersecurity assessment analyst and has a really diverse professional background. She has spoken at many different conferences, including BSides, ISSA OS, Ottawa, and hack fest. She&apos;s recently received the OSCP, a coveted security certification out there in the community. She has definitely written up and done tons of write-ups on the OSCP and different hack-the-box write-ups.   This episode will unravel how Rana discovered and journeyed through cryptography and pen testing despite attaining a computer science degree.</itunes:summary><itunes:author>Ayman Elsawah</itunes:author></item><item><title>Norman Weekes— From Contractor To Security Ops Analyst</title><itunes:title>Norman Weekes— From Contractor To Security Ops Analyst</itunes:title><description><![CDATA[<p>Norman Weekes is on the Security Operations Team at Salesforce. He is in charge of scanning their infrastructure and ensuring that everything is set up and operating properly.</p><p>Norman already spent almost a year in the information security world. This is also his first official full-time security job.&nbsp;After going through different job contracts, he believes that if everything's shut down early, there's no reason not to just get in a good routine and go after whatever certification or whatever job you want. This episode will undoubtedly inspire and assist job contractors who are considering a career in the information security world.</p><p><br></p><p><strong>LINKS</strong></p><p>Linkedin:&nbsp; <a href="https://www.linkedin.com/in/normanjr/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/normanjr/</a></p><p>Security and Privacy Framework: <a href="http://iapp.org/" rel="noopener noreferrer" target="_blank">iapp.org</a></p><p>Full Show Notes: <a href="https://www.gettingintoinfosec.com/" rel="noopener noreferrer" target="_blank">https://www.gettingintoinfosec.com/</a></p><p><br></p><p>Mentioned in this episode:</p><p><a href="https://getting-into-infosec.captivate.fm/stayintouch">Stay In Touch</a></p>]]></description><content:encoded><![CDATA[<p>Norman Weekes is on the Security Operations Team at Salesforce. He is in charge of scanning their infrastructure and ensuring that everything is set up and operating properly.</p><p>Norman already spent almost a year in the information security world. This is also his first official full-time security job.&nbsp;After going through different job contracts, he believes that if everything's shut down early, there's no reason not to just get in a good routine and go after whatever certification or whatever job you want. This episode will undoubtedly inspire and assist job contractors who are considering a career in the information security world.</p><p><br></p><p><strong>LINKS</strong></p><p>Linkedin:&nbsp; <a href="https://www.linkedin.com/in/normanjr/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/normanjr/</a></p><p>Security and Privacy Framework: <a href="http://iapp.org/" rel="noopener noreferrer" target="_blank">iapp.org</a></p><p>Full Show Notes: <a href="https://www.gettingintoinfosec.com/" rel="noopener noreferrer" target="_blank">https://www.gettingintoinfosec.com/</a></p><p><br></p><p>Mentioned in this episode:</p><p><a href="https://getting-into-infosec.captivate.fm/stayintouch">Stay In Touch</a></p>]]></content:encoded><link><![CDATA[https://getting-into-infosec.captivate.fm/episode/norman-weekes-from-contractor-to-security-ops-analyst]]></link><guid isPermaLink="false">b7705d8b-93f3-44d1-bf8c-ae4600a4bada</guid><itunes:image href="https://artwork.captivate.fm/a524f552-9a48-4cd6-9b93-e37929b6b579/image.jpg"/><dc:creator><![CDATA[Ayman Elsawah]]></dc:creator><pubDate>Thu, 24 Feb 2022 22:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/8dc7c386-273c-4214-a3ab-04ad45376978/audio.mp3" length="32346191" type="audio/mpeg"/><itunes:duration>33:42</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>42</itunes:episode><podcast:episode>42</podcast:episode><itunes:author>Ayman Elsawah</itunes:author></item><item><title>Niru Ragupathy - From Almost Biotech to QA to Google Security Lead</title><itunes:title>Niru Ragupathy - From Almost Biotech to QA to Google Security Lead</itunes:title><description><![CDATA[<p>Niru Ragupathy is a Security Engineer at Google and works as the Offensive Security Lead and manages part of the Offensive Security Team. She is currently the Tech Lead Manager. Niru sees managing as a challenging, interesting ride yet undervalued skill. She also considers it rewarding although it demands the investment of both time and effort.&nbsp;</p><p>She believes that it is important to start leading and take things slowly but not take the decision lightly. Having planned on taking Biotech in College but being persuaded by her parents, she was thrust to take on Computer Sciences since it has greater demands in society. In the face of her struggles, Niru has found her sense of belongingness in security management. This episode will surely encourage and benefit Engineers who struggle in transitioning on management.&nbsp;</p><p><strong>LINKS</strong></p><p>Linkedin: <a href="https://www.linkedin.com/in/niru-ragupathy-99078233?lipi=urn%3Ali%3Apage%3Ad_flagship3_profile_view_base_contact_details%3Bhi6H%2FHw0RbSnN8Bu%2BtP0gQ%3D%3D" rel="noopener noreferrer" target="_blank">linkedin.com/in/niru-ragupathy-99078233</a></p><p>Mentioned in this episode:</p><p><a href="https://getting-into-infosec.captivate.fm/stayintouch">Stay In Touch</a></p>]]></description><content:encoded><![CDATA[<p>Niru Ragupathy is a Security Engineer at Google and works as the Offensive Security Lead and manages part of the Offensive Security Team. She is currently the Tech Lead Manager. Niru sees managing as a challenging, interesting ride yet undervalued skill. She also considers it rewarding although it demands the investment of both time and effort.&nbsp;</p><p>She believes that it is important to start leading and take things slowly but not take the decision lightly. Having planned on taking Biotech in College but being persuaded by her parents, she was thrust to take on Computer Sciences since it has greater demands in society. In the face of her struggles, Niru has found her sense of belongingness in security management. This episode will surely encourage and benefit Engineers who struggle in transitioning on management.&nbsp;</p><p><strong>LINKS</strong></p><p>Linkedin: <a href="https://www.linkedin.com/in/niru-ragupathy-99078233?lipi=urn%3Ali%3Apage%3Ad_flagship3_profile_view_base_contact_details%3Bhi6H%2FHw0RbSnN8Bu%2BtP0gQ%3D%3D" rel="noopener noreferrer" target="_blank">linkedin.com/in/niru-ragupathy-99078233</a></p><p>Mentioned in this episode:</p><p><a href="https://getting-into-infosec.captivate.fm/stayintouch">Stay In Touch</a></p>]]></content:encoded><link><![CDATA[https://getting-into-infosec.captivate.fm/episode/niru-ragupathy-from-almost-biotech-to-qa-to-google-security-lead]]></link><guid isPermaLink="false">5cbea56b-03e2-490f-ba84-ad6901239237</guid><itunes:image href="https://artwork.captivate.fm/f1b80ae6-bc18-4911-954f-c56ef52d9173/image.jpg"/><dc:creator><![CDATA[Ayman Elsawah]]></dc:creator><pubDate>Thu, 05 Aug 2021 06:39:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/513ad02f-a082-44eb-aef2-cce8969908a0/audio.mp3" length="43094857" type="audio/mpeg"/><itunes:duration>44:53</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>41</itunes:episode><podcast:episode>41</podcast:episode><itunes:summary>Niru Ragupathy is a Security Engineer at Google and works as the Offensive Security Lead and manages part of the Offensive Security Team. She is currently the Tech Lead Manager. Niru sees managing as a challenging, interesting ride yet undervalued skill. She also considers it rewarding although it demands the investment of both time and effort.   She believes that it is important to start leading and take things slowly but not take the decision lightly. Having planned on taking Biotech in College but being persuaded by her parents, she was thrust to take on Computer Sciences since it has greater demands in society. In the face of her struggles, Niru has found her sense of belongingness in security management. This episode will surely encourage and benefit Engineers who struggle in transitioning on management.   LINKS  Linkedin: linkedin.com/in/niru-ragupathy-99078233  Intro Music: https://trash80.com/#/content/133/weeklybeats-2012-week5  Security and Privacy Framework: iapp.org     Full Show Notes: https://www.gettingintoinfosec.com/</itunes:summary><itunes:author>Ayman Elsawah</itunes:author></item><item><title>John Gates - From Car Mechanic to  Lead IT Security  Analyst</title><itunes:title>John Gates - From Car Mechanic to  Lead IT Security  Analyst</itunes:title><description><![CDATA[<p>John Gates is a Lead IT Security Operations Analyst for a global food brand. John has always liked to know how do things work - and that has proven to be a beneficial trait - from his first job as a car mechanic to IT consultancy and education to his current role. He&rsquo;s also an advisor and former board member at OpsecEdu, an organization educating technologists in state, local, and education agencies on security best practices.&nbsp;</p>
<p>LINKS</p>
<p>Linkedin:&nbsp;<a href="https://www.linkedin.com/in/johngates/">https://www.linkedin.com/in/johngates/</a></p>
<p>OpsecEdu: <a href="https://www.opsecedu.com/">https://www.opsecedu.com/</a></p>
<p>Intro Music:&nbsp;<a href="https://trash80.com/#/content/133/weeklybeats-2012-week5">https://trash80.com/#/content/133/weeklybeats-2012-week5</a></p>
<p>&nbsp;</p>
<p>Full Show Notes: https://www.gettingintoinfosec.com/john-gates-from-car-mechanic-to-lead-security-analyst/</p><p>See <a href="https://omnystudio.com/listener">omnystudio.com/listener</a> for privacy information.</p><p>Mentioned in this episode:</p><p><a href="https://getting-into-infosec.captivate.fm/stayintouch">Stay In Touch</a></p>]]></description><content:encoded><![CDATA[<p>John Gates is a Lead IT Security Operations Analyst for a global food brand. John has always liked to know how do things work - and that has proven to be a beneficial trait - from his first job as a car mechanic to IT consultancy and education to his current role. He&rsquo;s also an advisor and former board member at OpsecEdu, an organization educating technologists in state, local, and education agencies on security best practices.&nbsp;</p>
<p>LINKS</p>
<p>Linkedin:&nbsp;<a href="https://www.linkedin.com/in/johngates/">https://www.linkedin.com/in/johngates/</a></p>
<p>OpsecEdu: <a href="https://www.opsecedu.com/">https://www.opsecedu.com/</a></p>
<p>Intro Music:&nbsp;<a href="https://trash80.com/#/content/133/weeklybeats-2012-week5">https://trash80.com/#/content/133/weeklybeats-2012-week5</a></p>
<p>&nbsp;</p>
<p>Full Show Notes: https://www.gettingintoinfosec.com/john-gates-from-car-mechanic-to-lead-security-analyst/</p><p>See <a href="https://omnystudio.com/listener">omnystudio.com/listener</a> for privacy information.</p><p>Mentioned in this episode:</p><p><a href="https://getting-into-infosec.captivate.fm/stayintouch">Stay In Touch</a></p>]]></content:encoded><link><![CDATA[https://getting-into-infosec.captivate.fm/episode/john-gates-from-car-mechanic-to-lead-it-security-analyst]]></link><guid isPermaLink="false">de72aa40-7cd7-484c-8e0b-ad4700afb03b</guid><itunes:image href="https://artwork.captivate.fm/30878ef9-e722-4d4f-9c5a-4a052fa5b4b2/image.jpg"/><dc:creator><![CDATA[Ayman Elsawah (@coffeewithayman)]]></dc:creator><pubDate>Wed, 16 Jun 2021 02:24:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/618b0064-8909-40b7-9394-5dbae43bb005/audio.mp3" length="35275671" type="audio/mpeg"/><itunes:duration>36:45</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>40</itunes:episode><podcast:episode>40</podcast:episode><itunes:summary>John Gates is a Lead IT Security Operations Analyst for a global food brand. John has always liked to know how do things work - and that has proven to be a beneficial trait - from his first job as a car mechanic to IT consultancy and education to his current role. He’s also an advisor and former board member at OpsecEdu, an organization educating technologists in state, local, and education agencies on security best practices.   LINKS  Linkedin: https://www.linkedin.com/in/johngates/  OpsecEdu: https://www.opsecedu.com/  Intro Music: https://trash80.com/#/content/133/weeklybeats-2012-week5     Full Show Notes: https://www.gettingintoinfosec.com/john-gates-from-car-mechanic-to-lead-security-analyst/</itunes:summary><itunes:author>Ayman Elsawah (@coffeewithayman)</itunes:author></item><item><title>Samantha Cowan - From National Parks Service To Head Of Compliance</title><itunes:title>Samantha Cowan - From National Parks Service To Head Of Compliance</itunes:title><description><![CDATA[<p>Samantha Cowan is the Head of Compliance at HackerOne. She's the former Director of Compliance at OneLogin and former Security Engineer at CoverHound, Cyber Policy, and Zenefits. Sam initially perceived Infosec as an "unhappy job", but later found herself taking her MBA and paving her way into the security industry. Despite having her master's degree, she was not an exemption to facing rejections when applying for cybersecurity. Her episode is mind-blowing as she shares how you can break into boundaries by being confident in yourself and by not compromising to being seen as a token hire.</p>
<p><strong>LINKS</strong></p>
<ul>
<li>Linkedin: <a href="https://www.linkedin.com/in/samanthacowan/">https://www.linkedin.com/in/samanthacowan/</a></li>
<li>Intro Music: <a href="https://trash80.com/#/content/133/weeklybeats-2012-week5">https://trash80.com/#/content/133/weeklybeats-2012-week5</a></li>
<li>Security and Privacy Framework: <a href="http://iapp.org">iapp.org</a></li>
</ul><br/>
<p>----------------------------------------------</p>
<p>Follow <a href="https://twitter.com/coffeewithayman">@coffeewithayman</a> on Twitter for more</p>
<p>For more information check out: <a href="http://gettingintoinfosec.com/">gettingintoinfosec.com</a></p><p>See <a href="https://omnystudio.com/listener">omnystudio.com/listener</a> for privacy information.</p><p>Mentioned in this episode:</p><p><a href="https://getting-into-infosec.captivate.fm/stayintouch">Stay In Touch</a></p>]]></description><content:encoded><![CDATA[<p>Samantha Cowan is the Head of Compliance at HackerOne. She's the former Director of Compliance at OneLogin and former Security Engineer at CoverHound, Cyber Policy, and Zenefits. Sam initially perceived Infosec as an "unhappy job", but later found herself taking her MBA and paving her way into the security industry. Despite having her master's degree, she was not an exemption to facing rejections when applying for cybersecurity. Her episode is mind-blowing as she shares how you can break into boundaries by being confident in yourself and by not compromising to being seen as a token hire.</p>
<p><strong>LINKS</strong></p>
<ul>
<li>Linkedin: <a href="https://www.linkedin.com/in/samanthacowan/">https://www.linkedin.com/in/samanthacowan/</a></li>
<li>Intro Music: <a href="https://trash80.com/#/content/133/weeklybeats-2012-week5">https://trash80.com/#/content/133/weeklybeats-2012-week5</a></li>
<li>Security and Privacy Framework: <a href="http://iapp.org">iapp.org</a></li>
</ul><br/>
<p>----------------------------------------------</p>
<p>Follow <a href="https://twitter.com/coffeewithayman">@coffeewithayman</a> on Twitter for more</p>
<p>For more information check out: <a href="http://gettingintoinfosec.com/">gettingintoinfosec.com</a></p><p>See <a href="https://omnystudio.com/listener">omnystudio.com/listener</a> for privacy information.</p><p>Mentioned in this episode:</p><p><a href="https://getting-into-infosec.captivate.fm/stayintouch">Stay In Touch</a></p>]]></content:encoded><link><![CDATA[https://getting-into-infosec.captivate.fm/episode/samantha-cowan-from-national-parks-service-to-head-of-compliance]]></link><guid isPermaLink="false">f3642b18-f3c0-496e-885c-ad1d011ba018</guid><itunes:image href="https://artwork.captivate.fm/225e5f35-99a9-4a61-aee7-85213019077a/image.jpg"/><dc:creator><![CDATA[Ayman Elsawah (@coffeewithayman)]]></dc:creator><pubDate>Mon, 31 May 2021 23:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/8aa0aa42-5548-4479-a0cd-9fd7dbd3e2b6/audio.mp3" length="38781936" type="audio/mpeg"/><itunes:duration>40:24</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>39</itunes:episode><podcast:episode>39</podcast:episode><itunes:author>Ayman Elsawah (@coffeewithayman)</itunes:author></item><item><title>Betsy Bevilacqua - From Almost Lawyer to CISO and Security Leader</title><itunes:title>Betsy Bevilacqua - From Almost Lawyer to CISO and Security Leader</itunes:title><description><![CDATA[<p>Betsy Bevilacqua is the current VP of Information Security at Chainalysis. Initially, she had her mind set on law school until she did a self-audit and realized that she enjoyed computers and tech much more. Her journey into infosec led her to move from Kenya to the US to obtain a degree in Security and explore various companies involved in academia, food and facilities, healthcare, telephone communications, and finance to more traditional tech. Her interview is full of advice for those looking to break in and those already in infosec.Computer</p>
<p>Links, Detailed Show Notes, and Transcript:</p>
<p><a href="https://gettingintoinfosec.com/betsy">https://gettingintoinfosec.com/betsy</a></p>
<ul></ul><br/><p>See <a href="https://omnystudio.com/listener">omnystudio.com/listener</a> for privacy information.</p><p>Mentioned in this episode:</p><p><a href="https://getting-into-infosec.captivate.fm/stayintouch">Stay In Touch</a></p>]]></description><content:encoded><![CDATA[<p>Betsy Bevilacqua is the current VP of Information Security at Chainalysis. Initially, she had her mind set on law school until she did a self-audit and realized that she enjoyed computers and tech much more. Her journey into infosec led her to move from Kenya to the US to obtain a degree in Security and explore various companies involved in academia, food and facilities, healthcare, telephone communications, and finance to more traditional tech. Her interview is full of advice for those looking to break in and those already in infosec.Computer</p>
<p>Links, Detailed Show Notes, and Transcript:</p>
<p><a href="https://gettingintoinfosec.com/betsy">https://gettingintoinfosec.com/betsy</a></p>
<ul></ul><br/><p>See <a href="https://omnystudio.com/listener">omnystudio.com/listener</a> for privacy information.</p><p>Mentioned in this episode:</p><p><a href="https://getting-into-infosec.captivate.fm/stayintouch">Stay In Touch</a></p>]]></content:encoded><link><![CDATA[https://getting-into-infosec.captivate.fm/episode/betsy-bevilacqua-from-almost-lawyer-to-ciso-and-security-leader]]></link><guid isPermaLink="false">4ae5ee00-e755-4930-a2ca-acd901110062</guid><itunes:image href="https://artwork.captivate.fm/1247a5bb-30df-43fd-9a2e-b21f26152254/image.jpg"/><dc:creator><![CDATA[Ayman Elsawah (@coffeewithayman)]]></dc:creator><pubDate>Sun, 28 Feb 2021 22:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/fadb1c76-3b0c-4e1b-88f9-60998854d39e/audio.mp3" length="39039816" type="audio/mpeg"/><itunes:duration>40:40</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>38</itunes:episode><podcast:episode>38</podcast:episode><itunes:summary>Betsy Bevilacqua is the current VP of Information Security at Chainalysis. Initially, she had her mind set on law school until she did a self-audit and realized that she enjoyed computers and tech much more. Her journey into infosec led her to move from Kenya to the US to obtain a degree in Security and explore various companies involved in academia, food and facilities, healthcare, telephone communications, and finance to more traditional tech. Her interview is full of advice for those looking to break in and those already in infosec.  Links, Detailed Show Notes, and Transcript:  https://gettingintoinfosec.com/betsy</itunes:summary><itunes:author>Ayman Elsawah (@coffeewithayman)</itunes:author></item><item><title>Dr. Eric Cole - Accidental CIA Hacker To Fortune 500 Security Advisory To Entrepreneur</title><itunes:title>Dr. Eric Cole - Accidental CIA Hacker To Fortune 500 Security Advisory To Entrepreneur</itunes:title><description><![CDATA[<p>Dr. Eric Cole is an accomplished cybersecurity hacker and executive advisor. His career has been a mix of sixth-sense chance encounters and wisdom/foresight of the future. His uncanny ability to see the opportunity in cybersecurity combined with the wisdom to listen to those smarter than him is why he is where he is today. His interview is chock full of poignant advice and tips.</p>
<p>Dr. Eric Cole also has a creative side to him: he's a musician. He was a French horn player before and now, he's a drummer. He's known as the Tommy Lee of Cybersecurity.</p>
<p>Eric Cole's Quick List of Advice</p>
<ul>
<li>Always be respectful, Don't be an A**Hole to other people&hellip; but don't give a crap what other people say or think because we're unique and different. If you're an entrepreneur in cybersecurity, they're not gonna get ya.</li>
<li>Listen to people that are smarter than you and have made the mistakes before you make them.</li>
<li>Life will force you to repeat lessons until you learn them.</li>
<li>The biggest gap is in the monitoring, detection, and analyst side.</li>
</ul><br/>
<p>Quotes</p>
<ul>
<li>"It's all about looking at calculated risk, understanding [the] pros and cons, and taking chances."</li>
<li>"You've done the same thing six times in a row, and it doesn't work. What makes you think if you do it a seventh time [that] it's actually going to work?"</li>
<li>"Try different things."</li>
<li>"Have advisory board members for your life."</li>
<li>"If the best professionals in the world have coaches, why shouldn't we?"</li>
<li>"If people are not listening to your advice, 99% of the time, it's because you didn't answer the right question."</li>
<li>"Smart people know the right answer. Brilliant people ask the right question."</li>
<li>"Good cybersecurity people solve problems. Great cybersecurity people solve the right problems."</li>
<li>"Don't overlook the obvious."</li>
<li>"It's never a lack of resources, but a lack of resourcefulness."</li>
</ul><br/>
<p>Getting Into Infosec</p>
<p>Other episodes, transcripts, a career guide to Getting Into Infosec:<br><a href="https://gettingintoinfosec.com/">https://gettingintoinfosec.com/</a></p><p>See <a href="https://omnystudio.com/listener">omnystudio.com/listener</a> for privacy information.</p><p>Mentioned in this episode:</p><p><a href="https://getting-into-infosec.captivate.fm/stayintouch">Stay In Touch</a></p>]]></description><content:encoded><![CDATA[<p>Dr. Eric Cole is an accomplished cybersecurity hacker and executive advisor. His career has been a mix of sixth-sense chance encounters and wisdom/foresight of the future. His uncanny ability to see the opportunity in cybersecurity combined with the wisdom to listen to those smarter than him is why he is where he is today. His interview is chock full of poignant advice and tips.</p>
<p>Dr. Eric Cole also has a creative side to him: he's a musician. He was a French horn player before and now, he's a drummer. He's known as the Tommy Lee of Cybersecurity.</p>
<p>Eric Cole's Quick List of Advice</p>
<ul>
<li>Always be respectful, Don't be an A**Hole to other people&hellip; but don't give a crap what other people say or think because we're unique and different. If you're an entrepreneur in cybersecurity, they're not gonna get ya.</li>
<li>Listen to people that are smarter than you and have made the mistakes before you make them.</li>
<li>Life will force you to repeat lessons until you learn them.</li>
<li>The biggest gap is in the monitoring, detection, and analyst side.</li>
</ul><br/>
<p>Quotes</p>
<ul>
<li>"It's all about looking at calculated risk, understanding [the] pros and cons, and taking chances."</li>
<li>"You've done the same thing six times in a row, and it doesn't work. What makes you think if you do it a seventh time [that] it's actually going to work?"</li>
<li>"Try different things."</li>
<li>"Have advisory board members for your life."</li>
<li>"If the best professionals in the world have coaches, why shouldn't we?"</li>
<li>"If people are not listening to your advice, 99% of the time, it's because you didn't answer the right question."</li>
<li>"Smart people know the right answer. Brilliant people ask the right question."</li>
<li>"Good cybersecurity people solve problems. Great cybersecurity people solve the right problems."</li>
<li>"Don't overlook the obvious."</li>
<li>"It's never a lack of resources, but a lack of resourcefulness."</li>
</ul><br/>
<p>Getting Into Infosec</p>
<p>Other episodes, transcripts, a career guide to Getting Into Infosec:<br><a href="https://gettingintoinfosec.com/">https://gettingintoinfosec.com/</a></p><p>See <a href="https://omnystudio.com/listener">omnystudio.com/listener</a> for privacy information.</p><p>Mentioned in this episode:</p><p><a href="https://getting-into-infosec.captivate.fm/stayintouch">Stay In Touch</a></p>]]></content:encoded><link><![CDATA[https://getting-into-infosec.captivate.fm/episode/dr-eric-cole-accidental-cia-hacker-to-fortune-500-security-advisory-to-entrepreneur]]></link><guid isPermaLink="false">5ce65702-32bb-458c-a1ca-e0b46bd4daac</guid><itunes:image href="https://artwork.captivate.fm/331adb7f-1af6-4501-a41a-0d8ae5c2c39d/image.jpg"/><dc:creator><![CDATA[Ayman Elsawah (@coffeewithayman)]]></dc:creator><pubDate>Mon, 11 Jan 2021 06:55:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/0eb05240-7f2f-4c0a-9540-13cdb0f7b1da/audio.mp3" length="46320686" type="audio/mpeg"/><itunes:duration>48:15</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>37</itunes:episode><podcast:episode>37</podcast:episode><itunes:summary>Dr. Eric Cole&apos;s career has been a mixed of sixth-sense chance encounters and wisdom / foresight of the future. His uncanny ability while younger to see the opportunity in cybersecurity combined with the wisdom to listen to those smarter than him is why he is where he is today.</itunes:summary><itunes:author>Ayman Elsawah (@coffeewithayman)</itunes:author></item><item><title>Lisa Jiggetts - From Navy Cook To Pentester To Non-Profit Founder!</title><itunes:title>Lisa Jiggetts - From Navy Cook To Pentester To Non-Profit Founder!</itunes:title><description><![CDATA[<p>Lisa Jiggetts knew from an early age that she was going to be in tech and cyber. A navy veteran who started off as a cook, she always found herself gravitating towards technology. She is also the Founder &amp; Board of Director of the Women&rsquo;s Society of Cyberjutsu, a non-profit that is dedicated to increasing the opportunities and advancement for women in cybersecurity. Check out her journey into the cybersecurity field.</p>
<p><strong>Notes</strong></p>
<ul>
<li>Originally a cook in the military, then migrated to information security.</li>
<li>Looked for opportunities to transition into information security by talking to people in and outside her social network.</li>
<li>Networking can be hard, but it will turn in your favor.</li>
<li>Lisa is an introvert, but knows how to become an extrovert when needed.</li>
</ul><br/>
<p><strong>Quotes</strong></p>
<ul>
<li>"When you're starting out, you don't necessarily get into the area you want to be in&mdash;you got to work your way up."</li>
<li>&ldquo;That's the biggest thing you can do. I think is networking because somebody knows somebody."</li>
<li>"So I got all these certifications&hellip; I read a book and pass. What is it to me personally? That didn't tell me, you know, how to do anything. They get you in the door."</li>
<li>"[Networking is] hard, but just do it because, in the end, it's gonna turn out in your favor."</li>
</ul><br/>
<p><strong>Links</strong></p>
<ul>
<li>Lisa on Twitter: <a href="https://twitter.com/lisajiggetts">https://twitter.com/lisajiggetts</a></li>
<li>Intro Music: <a href="https://trash80.com/#/content/133/weeklybeats-2012-week5">https://trash80.com/#/content/133/weeklybeats-2012-week5</a></li>
<li>Women&rsquo;s Society of Cyberjutsu: <a href="https://womenscyberjutsu.org/">https://womenscyberjutsu.org/</a></li>
</ul><br/>
<p><strong>Getting Into Infosec</strong></p>
<ul>
<li>Breaking IN: A Practical Guide to Starting a Career in Information Security: <a href="https://www.amazon.com/dp/B07N15GTPC/">https://www.amazon.com/dp/B07N15GTPC/</a></li>
<li>T-Shirts, Mugs, and more: <a href="https://gettingintoinfosec.com/shop/">https://gettingintoinfosec.com/shop/</a>&nbsp;</li>
<li>Stay in touch and sign up for sneak peeks, updates, and commentary: <a href="https://gettingintoinfosec.com/subscribe">https://gettingintoinfosec.com/subscribe</a></li>
<li>Ayman on Twitter: <a href="https://twitter.com/coffeewithayman">https://twitter.com/coffeewithayman</a></li>
<li>Follow Us on Twitter: &nbsp;<a href="https://twitter.com/getintoinfosec">https://twitter.com/getintoinfosec</a></li>
<li>Follow Us on Instagram: <a href="https://www.instagram.com/coffeewithayman/">https://www.instagram.com/coffeewithayman/</a></li>
<li>Join our community: <a href="https://community.gettingintoinfosec.com/">https://community.gettingintoinfosec.com/</a></li>
</ul><br/><p>See <a href="https://omnystudio.com/listener">omnystudio.com/listener</a> for privacy information.</p><p>Mentioned in this episode:</p><p><a href="https://getting-into-infosec.captivate.fm/stayintouch">Stay In Touch</a></p>]]></description><content:encoded><![CDATA[<p>Lisa Jiggetts knew from an early age that she was going to be in tech and cyber. A navy veteran who started off as a cook, she always found herself gravitating towards technology. She is also the Founder &amp; Board of Director of the Women&rsquo;s Society of Cyberjutsu, a non-profit that is dedicated to increasing the opportunities and advancement for women in cybersecurity. Check out her journey into the cybersecurity field.</p>
<p><strong>Notes</strong></p>
<ul>
<li>Originally a cook in the military, then migrated to information security.</li>
<li>Looked for opportunities to transition into information security by talking to people in and outside her social network.</li>
<li>Networking can be hard, but it will turn in your favor.</li>
<li>Lisa is an introvert, but knows how to become an extrovert when needed.</li>
</ul><br/>
<p><strong>Quotes</strong></p>
<ul>
<li>"When you're starting out, you don't necessarily get into the area you want to be in&mdash;you got to work your way up."</li>
<li>&ldquo;That's the biggest thing you can do. I think is networking because somebody knows somebody."</li>
<li>"So I got all these certifications&hellip; I read a book and pass. What is it to me personally? That didn't tell me, you know, how to do anything. They get you in the door."</li>
<li>"[Networking is] hard, but just do it because, in the end, it's gonna turn out in your favor."</li>
</ul><br/>
<p><strong>Links</strong></p>
<ul>
<li>Lisa on Twitter: <a href="https://twitter.com/lisajiggetts">https://twitter.com/lisajiggetts</a></li>
<li>Intro Music: <a href="https://trash80.com/#/content/133/weeklybeats-2012-week5">https://trash80.com/#/content/133/weeklybeats-2012-week5</a></li>
<li>Women&rsquo;s Society of Cyberjutsu: <a href="https://womenscyberjutsu.org/">https://womenscyberjutsu.org/</a></li>
</ul><br/>
<p><strong>Getting Into Infosec</strong></p>
<ul>
<li>Breaking IN: A Practical Guide to Starting a Career in Information Security: <a href="https://www.amazon.com/dp/B07N15GTPC/">https://www.amazon.com/dp/B07N15GTPC/</a></li>
<li>T-Shirts, Mugs, and more: <a href="https://gettingintoinfosec.com/shop/">https://gettingintoinfosec.com/shop/</a>&nbsp;</li>
<li>Stay in touch and sign up for sneak peeks, updates, and commentary: <a href="https://gettingintoinfosec.com/subscribe">https://gettingintoinfosec.com/subscribe</a></li>
<li>Ayman on Twitter: <a href="https://twitter.com/coffeewithayman">https://twitter.com/coffeewithayman</a></li>
<li>Follow Us on Twitter: &nbsp;<a href="https://twitter.com/getintoinfosec">https://twitter.com/getintoinfosec</a></li>
<li>Follow Us on Instagram: <a href="https://www.instagram.com/coffeewithayman/">https://www.instagram.com/coffeewithayman/</a></li>
<li>Join our community: <a href="https://community.gettingintoinfosec.com/">https://community.gettingintoinfosec.com/</a></li>
</ul><br/><p>See <a href="https://omnystudio.com/listener">omnystudio.com/listener</a> for privacy information.</p><p>Mentioned in this episode:</p><p><a href="https://getting-into-infosec.captivate.fm/stayintouch">Stay In Touch</a></p>]]></content:encoded><link><![CDATA[https://getting-into-infosec.captivate.fm/episode/lisa-jiggetts-from-navy-cook-to-pentester-to-non-profit-founder]]></link><guid isPermaLink="false">f50763bf-2b49-43fe-9f75-e260751f8bca</guid><itunes:image href="https://artwork.captivate.fm/57fd9f81-34ed-4981-bc8a-f3765d084629/image.jpg"/><dc:creator><![CDATA[Ayman Elsawah (@coffeewithayman)]]></dc:creator><pubDate>Mon, 23 Nov 2020 20:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/78e2b1d9-a676-4111-8729-db54e78d2f57/audio.mp3" length="39073672" type="audio/mpeg"/><itunes:duration>40:42</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>36</itunes:episode><podcast:episode>36</podcast:episode><itunes:summary>Lisa Jiggetts knew from an early age that she was going to be in tech an cyber. A navy veteren who started off as a cook, she always found herself gravitating towards technology. She is also the Founder &amp; Board of Director of Women’s Society of Cyberjutsu, a non-profit that is dedicated to increasing the opportunities and advancement for women in cybersecurity. Checkout her journey into the cybersecurity field.</itunes:summary><itunes:author>Ayman Elsawah (@coffeewithayman)</itunes:author></item><item><title>Eric Strom - From Lawyer to FBI Cyber Division Unit Chief</title><itunes:title>Eric Strom - From Lawyer to FBI Cyber Division Unit Chief</itunes:title><description><![CDATA[<p>Eric Strom is the Unit Chief of the Mission Critical Engagement Unit, Cyber Division. In this role, Mr. Strom oversees the FBI Cyber Division&rsquo;s private sector outreach efforts to the 16 critical infrastructure sectors, forging partnerships with companies in those sectors to develop and share threat intelligence related to activities by sophisticated criminal organizations as well as nation-state actors.</p>
<p>Notes</p>
<ul>
<li>Eric has been with the FBI for 21 years, since June 1999</li>
<li>Originally a lawyer practicing criminal defense and civil defense, then went to non-profit</li>
<li>Early on in the FBI, they had to do a lot of workarounds. Cyber wasn't so straightforward</li>
<li>56 Field offices were all doing something different, then became consolidated centrally as a service organization</li>
</ul><br/>
<p>Quotes</p>
<ul>
<li>
<p>"Now, it's funny. None of us really had a traditional cyber background. Tom started out his career as a geologist, and Keith actually started out selling, like, furniture. He was a salesman."</p>
</li>
<li>
<p>"But, I mean, from the legal standpoint, you've got third-party liability and other things. So we really had to walk a kind of a tight rope when it came to what types of malware we were infecting ourselves with. And then how far we'd let it go."</p>
</li>
<li>
<p>"And so as we're taking it over, it was really interesting to sit behind one of the malware analysts and watch a Wireshark and watch the instructions coming out. I crossed the wire. It was really cool. And when it really kind of sunk in, because to me, it was like a tangible thing. I can actually see it happening as it was going on."</p>
</li>
<li>
<p>"It's (cybersecurity) probably the most rewarding thing you'll ever do in your life."</p>
</li>
</ul><br/>
<p>Links</p>
<ul>
<li>FBI: <a href="https://www.fbi.gov/">https://www.fbi.gov/</a></li>
<li>Intro Music: <a href="https://trash80.com/#/content/133/weeklybeats-2012-week5">https://trash80.com/#/content/133/weeklybeats-2012-week5</a></li>
<li>Outro Music: <a href="https://freemusicarchive.org/music/KieLoKaz/Free_Ganymed/Alte_Herren_Kielokaz_ID_364">https://freemusicarchive.org/music/KieLoKaz/Free_Ganymed/Alte_Herren_Kielokaz_ID_364</a></li>
</ul><br/>
<p>Getting Into Infosec</p>
<ul>
<li>
<p>Breaking IN: A Practical Guide to Starting a Career in Information Security: <a href="https://www.amazon.com/dp/B07N15GTPC/">https://www.amazon.com/dp/B07N15GTPC/</a></p>
</li>
<li>
<p>T-Shirts, Mugs, and more: <a href="https://gettingintoinfosec.com/shop/">https://gettingintoinfosec.com/shop/</a></p>
</li>
<li>
<p>Stay in touch and sign up for sneak peeks, updates, and commentary: <a href="https://pages.gettingintoinfosec.com/subscribe">https://gettingintoinfosec.com/subscribe</a></p>
</li>
<li>
<p>Ayman on Twitter: <a href="https://twitter.com/coffeewithayman">https://twitter.com/coffeewithayman</a></p>
</li>
</ul><br/><p>See <a href="https://omnystudio.com/listener">omnystudio.com/listener</a> for privacy information.</p><p>Mentioned in this episode:</p><p><a href="https://getting-into-infosec.captivate.fm/stayintouch">Stay In Touch</a></p>]]></description><content:encoded><![CDATA[<p>Eric Strom is the Unit Chief of the Mission Critical Engagement Unit, Cyber Division. In this role, Mr. Strom oversees the FBI Cyber Division&rsquo;s private sector outreach efforts to the 16 critical infrastructure sectors, forging partnerships with companies in those sectors to develop and share threat intelligence related to activities by sophisticated criminal organizations as well as nation-state actors.</p>
<p>Notes</p>
<ul>
<li>Eric has been with the FBI for 21 years, since June 1999</li>
<li>Originally a lawyer practicing criminal defense and civil defense, then went to non-profit</li>
<li>Early on in the FBI, they had to do a lot of workarounds. Cyber wasn't so straightforward</li>
<li>56 Field offices were all doing something different, then became consolidated centrally as a service organization</li>
</ul><br/>
<p>Quotes</p>
<ul>
<li>
<p>"Now, it's funny. None of us really had a traditional cyber background. Tom started out his career as a geologist, and Keith actually started out selling, like, furniture. He was a salesman."</p>
</li>
<li>
<p>"But, I mean, from the legal standpoint, you've got third-party liability and other things. So we really had to walk a kind of a tight rope when it came to what types of malware we were infecting ourselves with. And then how far we'd let it go."</p>
</li>
<li>
<p>"And so as we're taking it over, it was really interesting to sit behind one of the malware analysts and watch a Wireshark and watch the instructions coming out. I crossed the wire. It was really cool. And when it really kind of sunk in, because to me, it was like a tangible thing. I can actually see it happening as it was going on."</p>
</li>
<li>
<p>"It's (cybersecurity) probably the most rewarding thing you'll ever do in your life."</p>
</li>
</ul><br/>
<p>Links</p>
<ul>
<li>FBI: <a href="https://www.fbi.gov/">https://www.fbi.gov/</a></li>
<li>Intro Music: <a href="https://trash80.com/#/content/133/weeklybeats-2012-week5">https://trash80.com/#/content/133/weeklybeats-2012-week5</a></li>
<li>Outro Music: <a href="https://freemusicarchive.org/music/KieLoKaz/Free_Ganymed/Alte_Herren_Kielokaz_ID_364">https://freemusicarchive.org/music/KieLoKaz/Free_Ganymed/Alte_Herren_Kielokaz_ID_364</a></li>
</ul><br/>
<p>Getting Into Infosec</p>
<ul>
<li>
<p>Breaking IN: A Practical Guide to Starting a Career in Information Security: <a href="https://www.amazon.com/dp/B07N15GTPC/">https://www.amazon.com/dp/B07N15GTPC/</a></p>
</li>
<li>
<p>T-Shirts, Mugs, and more: <a href="https://gettingintoinfosec.com/shop/">https://gettingintoinfosec.com/shop/</a></p>
</li>
<li>
<p>Stay in touch and sign up for sneak peeks, updates, and commentary: <a href="https://pages.gettingintoinfosec.com/subscribe">https://gettingintoinfosec.com/subscribe</a></p>
</li>
<li>
<p>Ayman on Twitter: <a href="https://twitter.com/coffeewithayman">https://twitter.com/coffeewithayman</a></p>
</li>
</ul><br/><p>See <a href="https://omnystudio.com/listener">omnystudio.com/listener</a> for privacy information.</p><p>Mentioned in this episode:</p><p><a href="https://getting-into-infosec.captivate.fm/stayintouch">Stay In Touch</a></p>]]></content:encoded><link><![CDATA[https://getting-into-infosec.captivate.fm/episode/eric-strom-from-lawyer-to-fbi-cyber-division-unit-chief]]></link><guid isPermaLink="false">a54e72f9-6495-43b0-a6a8-225b380bb6b1</guid><itunes:image href="https://artwork.captivate.fm/b158c46c-617a-4cee-8a5b-f5f2a66f1c55/image.jpg"/><dc:creator><![CDATA[Ayman Elsawah (@coffeewithayman)]]></dc:creator><pubDate>Sat, 24 Oct 2020 02:06:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/38a6a9b8-f5ef-42dc-992f-cd18f41eb5f2/audio.mp3" length="40200481" type="audio/mpeg"/><itunes:duration>41:52</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>35</itunes:episode><podcast:episode>35</podcast:episode><itunes:summary>Eric Strom is the Unit Chief of the Mission Critical Engagement Unit, Cyber Division. In this role, Mr. Strom oversees the FBI Cyber Division’s private sector outreach efforts to the 16 critical infrastructure sectors, forging partnerships with companies in those sectors to develop and share threat intelligence related to activities by sophisticated criminal organizations as well as nation state actors.</itunes:summary><itunes:author>Ayman Elsawah (@coffeewithayman)</itunes:author></item><item><title>ICS Gabe - Electrical Engineer to Accidental Cybersecurity ICS Expert</title><itunes:title>ICS Gabe - Electrical Engineer to Accidental Cybersecurity ICS Expert</itunes:title><description><![CDATA[<p>Gabriel Agboruche (@ICS_Gabe) is a senior ICS and OT cybersecurity consultant, helping organizations solve their most challenging industrial control security problems. And that was a mouthful, but that's what he does. His journey's unique one, and almost didn't happen.</p>
<p>Notes</p>
<ul>
<li>Gabe was a math whiz in the Detroit Public school system</li>
<li>During college, he had some unique experiences as an African American, one of which was due to him being the top of his class</li>
<li>Gabe was an electrical engineer working at a nuclear facility, then #Stuxnet happened</li>
<li>The demand for cybersecurity skills combined with his experience and love for growth paved the way for where he is today.</li>
</ul><br/>
<p>Quotes</p>
<ul>
<li>"All these systems are air-gapped by regulatory guidance."</li>
<li>"I'm here for my education. I'm going to get this education. And not even necessarily prove this person wrong, but I'm going to be here and do what I have to do in order to get where I desire to be."</li>
<li>"He's like, wow, you're the first black guy that I have ever seen in person."</li>
<li>"I almost rushed with him for one (a fra)."</li>
<li>" I saw that I would gain a greater exposure to a lot more technologies within my field. I get to see different plants. I get to touch different areas."</li>
</ul><br/>
<p>Links</p>
<ul>
<li>Twitter: <a href="https://twitter.com/ics_gabe">@ICS_Gabe</a></li>
<li><a href="https://podcasts.apple.com/us/podcast/ics-with-gabe-podcast/id1490528069">ICS with Gabe Podcast</a></li>
<li><a href="https://darknetdiaries.com/episode/68/">Darknet Diaries Triton Episode</a></li>
<li><a href="https://gettingintoinfosec.com/jack">An Episode with Jack Rhysider</a></li>
</ul><br/>
<p><strong>Getting Into Infosec Info</strong></p>
<ul>
<li>Breaking IN: A Practical Guide to Starting a Career in Information Security: <a href="https://www.amazon.com/dp/B07N15GTPC/">https://www.amazon.com/dp/B07N15GTPC/</a></li>
<li>T-Shirts, Mugs, and more: <a href="https://gettingintoinfosec.com/shop/">https://gettingintoinfosec.com/shop/</a></li>
<li>Stay in touch and sign up for sneak peeks, updates, and commentary: <a href="https://pages.gettingintoinfosec.com/subscribe">https://gettingintoinfosec.com/subscribe</a></li>
<li>Ayman on Twitter: <a href="https://twitter.com/coffeewithayman">https://twitter.com/coffeewithayman</a></li>
</ul><br/><p>See <a href="https://omnystudio.com/listener">omnystudio.com/listener</a> for privacy information.</p><p>Mentioned in this episode:</p><p><a href="https://getting-into-infosec.captivate.fm/stayintouch">Stay In Touch</a></p>]]></description><content:encoded><![CDATA[<p>Gabriel Agboruche (@ICS_Gabe) is a senior ICS and OT cybersecurity consultant, helping organizations solve their most challenging industrial control security problems. And that was a mouthful, but that's what he does. His journey's unique one, and almost didn't happen.</p>
<p>Notes</p>
<ul>
<li>Gabe was a math whiz in the Detroit Public school system</li>
<li>During college, he had some unique experiences as an African American, one of which was due to him being the top of his class</li>
<li>Gabe was an electrical engineer working at a nuclear facility, then #Stuxnet happened</li>
<li>The demand for cybersecurity skills combined with his experience and love for growth paved the way for where he is today.</li>
</ul><br/>
<p>Quotes</p>
<ul>
<li>"All these systems are air-gapped by regulatory guidance."</li>
<li>"I'm here for my education. I'm going to get this education. And not even necessarily prove this person wrong, but I'm going to be here and do what I have to do in order to get where I desire to be."</li>
<li>"He's like, wow, you're the first black guy that I have ever seen in person."</li>
<li>"I almost rushed with him for one (a fra)."</li>
<li>" I saw that I would gain a greater exposure to a lot more technologies within my field. I get to see different plants. I get to touch different areas."</li>
</ul><br/>
<p>Links</p>
<ul>
<li>Twitter: <a href="https://twitter.com/ics_gabe">@ICS_Gabe</a></li>
<li><a href="https://podcasts.apple.com/us/podcast/ics-with-gabe-podcast/id1490528069">ICS with Gabe Podcast</a></li>
<li><a href="https://darknetdiaries.com/episode/68/">Darknet Diaries Triton Episode</a></li>
<li><a href="https://gettingintoinfosec.com/jack">An Episode with Jack Rhysider</a></li>
</ul><br/>
<p><strong>Getting Into Infosec Info</strong></p>
<ul>
<li>Breaking IN: A Practical Guide to Starting a Career in Information Security: <a href="https://www.amazon.com/dp/B07N15GTPC/">https://www.amazon.com/dp/B07N15GTPC/</a></li>
<li>T-Shirts, Mugs, and more: <a href="https://gettingintoinfosec.com/shop/">https://gettingintoinfosec.com/shop/</a></li>
<li>Stay in touch and sign up for sneak peeks, updates, and commentary: <a href="https://pages.gettingintoinfosec.com/subscribe">https://gettingintoinfosec.com/subscribe</a></li>
<li>Ayman on Twitter: <a href="https://twitter.com/coffeewithayman">https://twitter.com/coffeewithayman</a></li>
</ul><br/><p>See <a href="https://omnystudio.com/listener">omnystudio.com/listener</a> for privacy information.</p><p>Mentioned in this episode:</p><p><a href="https://getting-into-infosec.captivate.fm/stayintouch">Stay In Touch</a></p>]]></content:encoded><link><![CDATA[https://getting-into-infosec.captivate.fm/episode/ics-gabe-electrical-engineer-to-accidental-cybersecurity-ics-expert]]></link><guid isPermaLink="false">3ec145ed-06aa-454a-8051-3bfe0ff177a0</guid><itunes:image href="https://artwork.captivate.fm/be4a37b1-a262-43a9-9548-32e4b0696993/image.jpg"/><dc:creator><![CDATA[Ayman Elsawah (@coffeewithayman)]]></dc:creator><pubDate>Sat, 10 Oct 2020 23:56:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/ef61b58b-fe01-426e-aabd-6e7e2879ea01/audio.mp3" length="57023350" type="audio/mpeg"/><itunes:duration>59:24</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>34</itunes:episode><podcast:episode>34</podcast:episode><itunes:summary>Gabriel Agboruche (@ICS_Gabe) is a senior ICS and OT cybersecurity consultant, helping organizations solve their most challenging industrial control security problems. And that was a mouthful, but that&apos;s what I do. Journey&apos;s unique one and almost didn&apos;t happen.</itunes:summary><itunes:author>Ayman Elsawah (@coffeewithayman)</itunes:author></item><item><title>BONUS - Lisa Jiggetts - Salary Negotiations</title><itunes:title>BONUS - Lisa Jiggetts - Salary Negotiations</itunes:title><description><![CDATA[<p>Lisa Jiggetts is the founder of the Women's Society Of Cyberjutsu. After recording, we continued talking and the topic of salary negotiations came up. It was so good I started recording again. This topic is super important. I have seen both experienced and inexperienced people make these mistakes.</p><h2>Links</h2><ul><li>Salary Negotiation Tips:  <a href="https://www.thebalancecareers.com/what-can-employers-say-about-former-employees-2059608">https://www.thebalancecareers.com/what-can-employers-say-about-former-employees-2059608</a> (see the video too)</li><li>Lisa on Twitter: <a href="https://twitter.com/lisajiggetts">https://twitter.com/lisajiggetts</a></li><li>A recruiter's comment on the topic: <a href="https://twitter.com/Zavala_CyberSN/status/1294398519994773505">https://twitter.com/Zavala_CyberSN/status/1294398519994773505</a></li></ul><br/><h2>Getting Into Infosec</h2><ul><li>Ask A Question: <a href="https://gettingintoinfosec.com/ask">https://gettingintoinfosec.com/ask</a></li><li>Website: <a href="https://gettingintoinfosec.com">https://gettingintoinfosec.com</a></li><li>Ayman on Twitter: <a href="https://twitter.com/coffeewithayman">https://twitter.com/coffeewithayman</a></li><li>Breaking IN Book: <a href="https://gettingintoinfosec.com/book">https://gettingintoinfosec.com/book</a></li><li>Join My Mailing List: <a href="https://gettingintoinfosec.com/list">https://gettingintoinfosec.com/list</a></li></ul><br/><p>See <a href="https://omnystudio.com/listener">omnystudio.com/listener</a> for privacy information.</p><p>Mentioned in this episode:</p><p><a href="https://getting-into-infosec.captivate.fm/stayintouch">Stay In Touch</a></p>]]></description><content:encoded><![CDATA[<p>Lisa Jiggetts is the founder of the Women's Society Of Cyberjutsu. After recording, we continued talking and the topic of salary negotiations came up. It was so good I started recording again. This topic is super important. I have seen both experienced and inexperienced people make these mistakes.</p><h2>Links</h2><ul><li>Salary Negotiation Tips:  <a href="https://www.thebalancecareers.com/what-can-employers-say-about-former-employees-2059608">https://www.thebalancecareers.com/what-can-employers-say-about-former-employees-2059608</a> (see the video too)</li><li>Lisa on Twitter: <a href="https://twitter.com/lisajiggetts">https://twitter.com/lisajiggetts</a></li><li>A recruiter's comment on the topic: <a href="https://twitter.com/Zavala_CyberSN/status/1294398519994773505">https://twitter.com/Zavala_CyberSN/status/1294398519994773505</a></li></ul><br/><h2>Getting Into Infosec</h2><ul><li>Ask A Question: <a href="https://gettingintoinfosec.com/ask">https://gettingintoinfosec.com/ask</a></li><li>Website: <a href="https://gettingintoinfosec.com">https://gettingintoinfosec.com</a></li><li>Ayman on Twitter: <a href="https://twitter.com/coffeewithayman">https://twitter.com/coffeewithayman</a></li><li>Breaking IN Book: <a href="https://gettingintoinfosec.com/book">https://gettingintoinfosec.com/book</a></li><li>Join My Mailing List: <a href="https://gettingintoinfosec.com/list">https://gettingintoinfosec.com/list</a></li></ul><br/><p>See <a href="https://omnystudio.com/listener">omnystudio.com/listener</a> for privacy information.</p><p>Mentioned in this episode:</p><p><a href="https://getting-into-infosec.captivate.fm/stayintouch">Stay In Touch</a></p>]]></content:encoded><link><![CDATA[https://getting-into-infosec.captivate.fm/episode/bonus-lisa-jiggetts-salary-negotiations]]></link><guid isPermaLink="false">b790a7ae-58c4-4f20-adf7-2402a6f28f38</guid><itunes:image href="https://artwork.captivate.fm/235338d8-4093-4d5b-bf43-f0432add1372/image.jpg"/><dc:creator><![CDATA[Ayman Elsawah (@coffeewithayman)]]></dc:creator><pubDate>Sat, 15 Aug 2020 21:01:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/17bf9d89-0b68-4f75-abdb-ee02118efb54/audio.mp3" length="15780364" type="audio/mpeg"/><itunes:duration>16:26</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>bonus</itunes:episodeType><itunes:summary>Lisa Jiggetts is the founder of the Women&apos;s Society Of Cyberjutsu. After recording, we continued talking and the topic of salary negotiations came up. It was so good I started recording again. This topic is super important. I have seen both experienced and inexperienced people make these mistakes.</itunes:summary><itunes:author>Ayman Elsawah (@coffeewithayman)</itunes:author></item><item><title>Switching Into Infosec Success Story And Lessons Learned</title><itunes:title>Switching Into Infosec Success Story And Lessons Learned</itunes:title><description><![CDATA[<p>Today's episode features a story that was sent to me by a listener. &nbsp;He reached out to me on LinkedIn, telling me of his success story posted on Reddit. This is the audio version. &nbsp;I think you're going to be really interested in what he had to say. &nbsp;He talks about his struggles and what he went through in his journey to Information Security.</p>
<p><strong>Original Reddit post: &nbsp;</strong></p>
<p><a href="https://www.reddit.com/r/ITCareerQuestions/comments/fw44sg/career_change_success_story_starting_my_first/">https://www.reddit.com/r/ITCareerQuestions/comments/fw44sg/career_change_success_story_starting_my_first/</a></p>
<p><strong>Getting Into Infosec Links:</strong></p>
<ul>
<li>Site: <a href="https://gettingintoinfosec.com/">https://gettingintoinfosec.com/</a></li>
<li>Book<strong>: </strong><a href="https://breakingintoinfosec.com/">https://breakingintoinfosec.com/</a></li>
<li>Follow Me Twitter For More Resources To Help You On Your Journey: <a href="https://twitter.com/coffeewithayman">https://twitter.com/coffeewithayman</a></li>
</ul><br/><p>See <a href="https://omnystudio.com/listener">omnystudio.com/listener</a> for privacy information.</p><p>Mentioned in this episode:</p><p><a href="https://getting-into-infosec.captivate.fm/stayintouch">Stay In Touch</a></p>]]></description><content:encoded><![CDATA[<p>Today's episode features a story that was sent to me by a listener. &nbsp;He reached out to me on LinkedIn, telling me of his success story posted on Reddit. This is the audio version. &nbsp;I think you're going to be really interested in what he had to say. &nbsp;He talks about his struggles and what he went through in his journey to Information Security.</p>
<p><strong>Original Reddit post: &nbsp;</strong></p>
<p><a href="https://www.reddit.com/r/ITCareerQuestions/comments/fw44sg/career_change_success_story_starting_my_first/">https://www.reddit.com/r/ITCareerQuestions/comments/fw44sg/career_change_success_story_starting_my_first/</a></p>
<p><strong>Getting Into Infosec Links:</strong></p>
<ul>
<li>Site: <a href="https://gettingintoinfosec.com/">https://gettingintoinfosec.com/</a></li>
<li>Book<strong>: </strong><a href="https://breakingintoinfosec.com/">https://breakingintoinfosec.com/</a></li>
<li>Follow Me Twitter For More Resources To Help You On Your Journey: <a href="https://twitter.com/coffeewithayman">https://twitter.com/coffeewithayman</a></li>
</ul><br/><p>See <a href="https://omnystudio.com/listener">omnystudio.com/listener</a> for privacy information.</p><p>Mentioned in this episode:</p><p><a href="https://getting-into-infosec.captivate.fm/stayintouch">Stay In Touch</a></p>]]></content:encoded><link><![CDATA[https://getting-into-infosec.captivate.fm/episode/switching-into-infosec-success-story-and-lessons-learned]]></link><guid isPermaLink="false">76e0041a-3684-4370-915f-05a35f3f8494</guid><itunes:image href="https://artwork.captivate.fm/0982a67b-e23f-4ea8-a6f0-613f4ba9234f/image.jpg"/><dc:creator><![CDATA[Ayman Elsawah (@coffeewithayman)]]></dc:creator><pubDate>Thu, 16 Jul 2020 04:30:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/7f19eefd-98d1-4c89-b0af-1ae46914301d/audio.mp3" length="9797292" type="audio/mpeg"/><itunes:duration>10:12</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>33</itunes:episode><podcast:episode>33</podcast:episode><itunes:summary>Today&apos;s episode features a story that was sent to me by a listener.  He reached out to me on LinkedIn telling me of his success story posted on reddit. This is the audio version.  I think you&apos;re going to be really interested in what he had to say.  He talks about his struggles and and what he went through in his journey to Information Security.</itunes:summary><itunes:author>Ayman Elsawah (@coffeewithayman)</itunes:author></item><item><title>Black Lives Matter</title><itunes:title>Black Lives Matter</itunes:title><description><![CDATA[<p dir="ltr"><strong>Transcript</strong></p>
<p>Hey everyone&hellip;&nbsp;</p>
<p>So, as if this time was not hard enough as it was with Covid, the American Black community has been affected yet again.</p>
<p>It's difficult to post motivating content while so many are feeling a sense of outrage and so much going on. So I'm going to pause, slow down, or at least take into consideration the posting of new content during this period. Of course, people still need to work, so I can't stop completely, and I do have episodes coming down the pipe.</p>
<p>There's a personal story I want to share related to this.</p>
<p>A friend and I were driving once, but he realized he left his wallet at home, which had his driver's license. I said, "Not a big deal. They can just look you up if you get pulled over." He then looked at me, and I then figured it out: he's black.</p>
<p>It hit me then how privileged of a life I had. It then hit me how scary driving while back really is. I may not be white, Christian, and from the suburbs, but I'm not black and male.</p>
<p>I may not have the best things to say at this moment, but I realize staying silent isn't an option. I don't have a TV, and I'm not on Twitter often, but the little I did see made me realize silence or status quo is almost as bad.</p>
<p>Diversity and inclusion are an integral part of this podcast. I've never called it out as I just wanted my lineup to speak for itself. Many of my guests are black.&nbsp;For the longest time, it was rare to see a brown or black person at a security conference. It was quite lonely.</p>
<p>For listeners outside of the US, please try to empathize with whatever social divide you have in your country. It could be the religious minority in your country, the darker-skinned, those of a "lower" social caste, the poor, or whomever it may be. There are always those that are marginally suppressed or oppressed.</p>
<p>So&hellip;.</p>
<p>I stand with the Black community against racism, violence, and hate. Now, more than ever, we must support one another as allies and speak up for justice and equality.</p>
<p><a href="https://www.youtube.com/results?search_query=%23BlackLivesMatter">#BlackLivesMatter</a></p>
<p>******************************************</p>
<p>Website:<a href="https://www.youtube.com/redirect?q=https%3A%2F%2Fgettingintoinfosec.com%2F&amp;v=Xt6sCOaFukY&amp;event=video_description&amp;redir_token=La9QOKijyPfvi-mpTrj_yyWXChJ8MTU5MTEzOTgzN0AxNTkxMDUzNDM3"> https://gettingintoinfosec.com/</a></p>
<p>Twitter: <a href="https://www.youtube.com/redirect?q=https%3A%2F%2Ftwitter.com%2Fcoffeewithayman&amp;v=Xt6sCOaFukY&amp;event=video_description&amp;redir_token=La9QOKijyPfvi-mpTrj_yyWXChJ8MTU5MTEzOTgzN0AxNTkxMDUzNDM3">https://twitter.com/coffeewithayman</a></p><p>See <a href="https://omnystudio.com/listener">omnystudio.com/listener</a> for privacy information.</p><p>Mentioned in this episode:</p><p><a href="https://getting-into-infosec.captivate.fm/stayintouch">Stay In Touch</a></p>]]></description><content:encoded><![CDATA[<p dir="ltr"><strong>Transcript</strong></p>
<p>Hey everyone&hellip;&nbsp;</p>
<p>So, as if this time was not hard enough as it was with Covid, the American Black community has been affected yet again.</p>
<p>It's difficult to post motivating content while so many are feeling a sense of outrage and so much going on. So I'm going to pause, slow down, or at least take into consideration the posting of new content during this period. Of course, people still need to work, so I can't stop completely, and I do have episodes coming down the pipe.</p>
<p>There's a personal story I want to share related to this.</p>
<p>A friend and I were driving once, but he realized he left his wallet at home, which had his driver's license. I said, "Not a big deal. They can just look you up if you get pulled over." He then looked at me, and I then figured it out: he's black.</p>
<p>It hit me then how privileged of a life I had. It then hit me how scary driving while back really is. I may not be white, Christian, and from the suburbs, but I'm not black and male.</p>
<p>I may not have the best things to say at this moment, but I realize staying silent isn't an option. I don't have a TV, and I'm not on Twitter often, but the little I did see made me realize silence or status quo is almost as bad.</p>
<p>Diversity and inclusion are an integral part of this podcast. I've never called it out as I just wanted my lineup to speak for itself. Many of my guests are black.&nbsp;For the longest time, it was rare to see a brown or black person at a security conference. It was quite lonely.</p>
<p>For listeners outside of the US, please try to empathize with whatever social divide you have in your country. It could be the religious minority in your country, the darker-skinned, those of a "lower" social caste, the poor, or whomever it may be. There are always those that are marginally suppressed or oppressed.</p>
<p>So&hellip;.</p>
<p>I stand with the Black community against racism, violence, and hate. Now, more than ever, we must support one another as allies and speak up for justice and equality.</p>
<p><a href="https://www.youtube.com/results?search_query=%23BlackLivesMatter">#BlackLivesMatter</a></p>
<p>******************************************</p>
<p>Website:<a href="https://www.youtube.com/redirect?q=https%3A%2F%2Fgettingintoinfosec.com%2F&amp;v=Xt6sCOaFukY&amp;event=video_description&amp;redir_token=La9QOKijyPfvi-mpTrj_yyWXChJ8MTU5MTEzOTgzN0AxNTkxMDUzNDM3"> https://gettingintoinfosec.com/</a></p>
<p>Twitter: <a href="https://www.youtube.com/redirect?q=https%3A%2F%2Ftwitter.com%2Fcoffeewithayman&amp;v=Xt6sCOaFukY&amp;event=video_description&amp;redir_token=La9QOKijyPfvi-mpTrj_yyWXChJ8MTU5MTEzOTgzN0AxNTkxMDUzNDM3">https://twitter.com/coffeewithayman</a></p><p>See <a href="https://omnystudio.com/listener">omnystudio.com/listener</a> for privacy information.</p><p>Mentioned in this episode:</p><p><a href="https://getting-into-infosec.captivate.fm/stayintouch">Stay In Touch</a></p>]]></content:encoded><link><![CDATA[https://getting-into-infosec.captivate.fm/episode/black-lives-matter]]></link><guid isPermaLink="false">b92eb2af-ba57-454e-a316-e8b1523dea41</guid><itunes:image href="https://artwork.captivate.fm/3acdbc0d-6149-46e2-ba3c-d5a66dcda56f/image.jpg"/><dc:creator><![CDATA[Ayman Elsawah (@coffeewithayman)]]></dc:creator><pubDate>Mon, 01 Jun 2020 23:23:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/c1756373-14f9-4f47-aa86-082c15d3468c/audio.mp3" length="1159290" type="audio/mpeg"/><itunes:duration>01:12</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>bonus</itunes:episodeType><itunes:summary>#BlackLivesMatter

******************************************

Website: https://gettingintoinfosec.com/

Twitter: https://twitter.com/coffeewithayman</itunes:summary><itunes:author>Ayman Elsawah (@coffeewithayman)</itunes:author></item><item><title>BONUS - Announcing Getting Into Infosec BITES</title><itunes:title>BONUS - Announcing Getting Into Infosec BITES</itunes:title><description><![CDATA[<p>Hello! Wanted to let you know I'm creating daily (almost) videos on YouTube called Getting Into Infosec BITES: https://www.youtube.com/c/gettingintoinfosec</p>
<p>Please like, subscribe, and spread the word.</p>
<p>The best thing you can do to support this media is to spread the word and let others know. Thanks!</p>
<p>Links:</p>
<ul>
<li>Site: <a href="http://gettingintoinfosec.com/">http://gettingintoinfosec.com/</a></li>
<li>Book: <a href="http://breakingintoinfosec.com/">http://breakingintoinfosec.com/</a></li>
<li>Twitter: <a href="https://twitter.com/coffeewithayman">https://twitter.com/coffeewithayman</a></li>
</ul><br/><p>See <a href="https://omnystudio.com/listener">omnystudio.com/listener</a> for privacy information.</p><p>Mentioned in this episode:</p><p><a href="https://getting-into-infosec.captivate.fm/stayintouch">Stay In Touch</a></p>]]></description><content:encoded><![CDATA[<p>Hello! Wanted to let you know I'm creating daily (almost) videos on YouTube called Getting Into Infosec BITES: https://www.youtube.com/c/gettingintoinfosec</p>
<p>Please like, subscribe, and spread the word.</p>
<p>The best thing you can do to support this media is to spread the word and let others know. Thanks!</p>
<p>Links:</p>
<ul>
<li>Site: <a href="http://gettingintoinfosec.com/">http://gettingintoinfosec.com/</a></li>
<li>Book: <a href="http://breakingintoinfosec.com/">http://breakingintoinfosec.com/</a></li>
<li>Twitter: <a href="https://twitter.com/coffeewithayman">https://twitter.com/coffeewithayman</a></li>
</ul><br/><p>See <a href="https://omnystudio.com/listener">omnystudio.com/listener</a> for privacy information.</p><p>Mentioned in this episode:</p><p><a href="https://getting-into-infosec.captivate.fm/stayintouch">Stay In Touch</a></p>]]></content:encoded><link><![CDATA[https://getting-into-infosec.captivate.fm/episode/bonus-announcing-getting-into-infosec-bites]]></link><guid isPermaLink="false">69120a74-90cd-419f-a7ac-2cb59f59ac12</guid><itunes:image href="https://artwork.captivate.fm/6570f7d5-f08e-4e18-8b18-739fcfe32ef6/image.jpg"/><dc:creator><![CDATA[Ayman Elsawah (@coffeewithayman)]]></dc:creator><pubDate>Thu, 14 May 2020 00:47:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/16e104fa-5546-4b97-8fc6-b7c6620a1a10/audio.mp3" length="3860170" type="audio/mpeg"/><itunes:duration>04:01</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>bonus</itunes:episodeType><itunes:summary>Hello! Wanted to let you know I&apos;m creating daily (almost) videos on YouTube called Getting Into Infosec BITES: https://www.youtube.com/c/gettingintoinfosec

Please like, subscribe, and spread the word!</itunes:summary><itunes:author>Ayman Elsawah (@coffeewithayman)</itunes:author></item><item><title>Kavya Pearlman - From Hairstylist to CISO to XR Superhero</title><itunes:title>Kavya Pearlman - From Hairstylist to CISO to XR Superhero</itunes:title><description><![CDATA[<p>Kavya Pearlman is an award-winning cybersecurity professional with a deep interest in immersive and emerging technologies. Kavya is the founder of the non-profit XR Safety Initiative (XRSI). XRSI is the first global effort to promote privacy, security, ethics, and develop standards and guidelines for Virtual Reality, Augmented Reality, and Mixed Reality (VR/AR/MR), collectively known as XR.</p>
<p>Kavya is constantly exploring new technologies to solve current cybersecurity challenges.</p>
<p><strong>Quotes:</strong></p>
<ul>
<li>"Money, money, money. How much money [are] you going to make? I was so put off. No, it's not about money. I really just want to learn."&nbsp;</li>
<li>"What would you become when you grow up? I would be a D.I.G. (Deputy Inspector General)."</li>
<li>"This country needs me. This world needs me."</li>
<li>"You owe it to yourself to explore this little itch, and figure out whether this is your passion or not."&nbsp;</li>
<li>"You will inevitably make (sometimes) bad decisions."</li>
<li>"Technical support IS security."&nbsp;</li>
<li>"I don't think anyone read that [report], but then it gave me some satisfaction that this is awesome. I can actually take what I'm learning and apply it to the job."&nbsp;</li>
<li>"Believe in yourself. Not just for information security."&nbsp;</li>
</ul><br/>
<p><strong>Links:</strong></p>
<ul>
<li>Kavya Pearlman -&nbsp;<a href="https://twitter.com/KavyaPearlman">https://twitter.com/KavyaPearlman</a></li>
<li>XRSI -&nbsp;<a href="https://www.xrsi.org/">https://www.xrsi.org/</a></li>
<li>Caroline Wong -&nbsp;<a href="https://twitter.com/carolinewmwong">https://twitter.com/carolinewmwong</a></li>
<li>Steve Hunt [22:17] -&nbsp;<a href="https://twitter.com/Steve_Hunt">https://twitter.com/Steve_Hunt</a></li>
</ul><br/>
<p><strong>Getting Into Infosec:</strong></p>
<ul>
<li>Breaking IN: A Practical Guide to Starting a Career in Information Security: <a href="https://www.amazon.com/dp/B07N15GTPC/%5C%5D(https://www.amazon.com/dp/B07N15GTPC/)">https://www.amazon.com/dp/B07N15GTPC/</a></li>
<li>T-Shirts, Mugs, and more: <a href="https://gettingintoinfosec.com/shop/%5C%5D(https://gettingintoinfosec.com/shop/)">https://gettingintoinfosec.com/shop/</a></li>
<li>Stay in touch and sign up for sneak peeks, updates, and commentary: <a href="https://pages.gettingintoinfosec.com/subscribe%5C%5D(https://pages.gettingintoinfosec.com/subscribe)">https://pages.gettingintoinfosec.com/subscribe</a></li>
</ul><br/><p>See <a href="https://omnystudio.com/listener">omnystudio.com/listener</a> for privacy information.</p><p>Mentioned in this episode:</p><p><a href="https://getting-into-infosec.captivate.fm/stayintouch">Stay In Touch</a></p>]]></description><content:encoded><![CDATA[<p>Kavya Pearlman is an award-winning cybersecurity professional with a deep interest in immersive and emerging technologies. Kavya is the founder of the non-profit XR Safety Initiative (XRSI). XRSI is the first global effort to promote privacy, security, ethics, and develop standards and guidelines for Virtual Reality, Augmented Reality, and Mixed Reality (VR/AR/MR), collectively known as XR.</p>
<p>Kavya is constantly exploring new technologies to solve current cybersecurity challenges.</p>
<p><strong>Quotes:</strong></p>
<ul>
<li>"Money, money, money. How much money [are] you going to make? I was so put off. No, it's not about money. I really just want to learn."&nbsp;</li>
<li>"What would you become when you grow up? I would be a D.I.G. (Deputy Inspector General)."</li>
<li>"This country needs me. This world needs me."</li>
<li>"You owe it to yourself to explore this little itch, and figure out whether this is your passion or not."&nbsp;</li>
<li>"You will inevitably make (sometimes) bad decisions."</li>
<li>"Technical support IS security."&nbsp;</li>
<li>"I don't think anyone read that [report], but then it gave me some satisfaction that this is awesome. I can actually take what I'm learning and apply it to the job."&nbsp;</li>
<li>"Believe in yourself. Not just for information security."&nbsp;</li>
</ul><br/>
<p><strong>Links:</strong></p>
<ul>
<li>Kavya Pearlman -&nbsp;<a href="https://twitter.com/KavyaPearlman">https://twitter.com/KavyaPearlman</a></li>
<li>XRSI -&nbsp;<a href="https://www.xrsi.org/">https://www.xrsi.org/</a></li>
<li>Caroline Wong -&nbsp;<a href="https://twitter.com/carolinewmwong">https://twitter.com/carolinewmwong</a></li>
<li>Steve Hunt [22:17] -&nbsp;<a href="https://twitter.com/Steve_Hunt">https://twitter.com/Steve_Hunt</a></li>
</ul><br/>
<p><strong>Getting Into Infosec:</strong></p>
<ul>
<li>Breaking IN: A Practical Guide to Starting a Career in Information Security: <a href="https://www.amazon.com/dp/B07N15GTPC/%5C%5D(https://www.amazon.com/dp/B07N15GTPC/)">https://www.amazon.com/dp/B07N15GTPC/</a></li>
<li>T-Shirts, Mugs, and more: <a href="https://gettingintoinfosec.com/shop/%5C%5D(https://gettingintoinfosec.com/shop/)">https://gettingintoinfosec.com/shop/</a></li>
<li>Stay in touch and sign up for sneak peeks, updates, and commentary: <a href="https://pages.gettingintoinfosec.com/subscribe%5C%5D(https://pages.gettingintoinfosec.com/subscribe)">https://pages.gettingintoinfosec.com/subscribe</a></li>
</ul><br/><p>See <a href="https://omnystudio.com/listener">omnystudio.com/listener</a> for privacy information.</p><p>Mentioned in this episode:</p><p><a href="https://getting-into-infosec.captivate.fm/stayintouch">Stay In Touch</a></p>]]></content:encoded><link><![CDATA[https://getting-into-infosec.captivate.fm/episode/kavya-pearlman-from-hairstylist-to-ciso-to-xr-superhero]]></link><guid isPermaLink="false">8d459f4f-4091-44f7-8b11-d24ee3a78684</guid><itunes:image href="https://artwork.captivate.fm/f28560df-4d67-4374-a7c1-8ac57053f355/image.jpg"/><dc:creator><![CDATA[Ayman Elsawah (@coffeewithayman)]]></dc:creator><pubDate>Sat, 18 Apr 2020 19:14:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/36698b84-17d1-4ab0-b362-9732587260e1/audio.mp3" length="37104239" type="audio/mpeg"/><itunes:duration>38:39</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>32</itunes:episode><podcast:episode>32</podcast:episode><itunes:summary>Kavya Pearlman is an Award-winning cybersecurity professional with a deep interest in immersive and emerging technologies. Kavya is the founder of non-profit, XR Safety Initiative (XRSI). XRSI is the very first global effort that promotes privacy, security, ethics and develops standards and guidelines for Virtual Reality, Augmented Reality and Mixed Reality (VR/AR/MR) collectively known as XR.
Kavya is constantly exploring new technologies to solve current cybersecurity challenges.</itunes:summary><itunes:author>Ayman Elsawah (@coffeewithayman)</itunes:author></item><item><title>BONUS - Pandemic and The Coming Recession / Depression</title><itunes:title>BONUS - Pandemic and The Coming Recession / Depression</itunes:title><description><![CDATA[<p>We are in the middle of a worldwide pandemic (COVID-19), a recession is here, a depression might be coming, and everyone is remote! Everything has changed. What can you do? How can you find a job in these crazy times? What are the challenges? How can you make yourself valuable? What's going through the company or hiring manager's mind?</p><p>Please share or leave an awesome review if you found this helpful.</p><p>See <a href="https://omnystudio.com/listener">omnystudio.com/listener</a> for privacy information.</p><p>Mentioned in this episode:</p><p><a href="https://getting-into-infosec.captivate.fm/stayintouch">Stay In Touch</a></p>]]></description><content:encoded><![CDATA[<p>We are in the middle of a worldwide pandemic (COVID-19), a recession is here, a depression might be coming, and everyone is remote! Everything has changed. What can you do? How can you find a job in these crazy times? What are the challenges? How can you make yourself valuable? What's going through the company or hiring manager's mind?</p><p>Please share or leave an awesome review if you found this helpful.</p><p>See <a href="https://omnystudio.com/listener">omnystudio.com/listener</a> for privacy information.</p><p>Mentioned in this episode:</p><p><a href="https://getting-into-infosec.captivate.fm/stayintouch">Stay In Touch</a></p>]]></content:encoded><link><![CDATA[https://getting-into-infosec.captivate.fm/episode/bonus-pandemic-and-the-coming-recession-depression]]></link><guid isPermaLink="false">e3d983ae-5f59-4efb-a3e8-16360adbfc9a</guid><itunes:image href="https://artwork.captivate.fm/f115bda8-c3eb-46e9-93e3-a9567eb949ec/image.jpg"/><dc:creator><![CDATA[Ayman Elsawah (@coffeewithayman)]]></dc:creator><pubDate>Thu, 02 Apr 2020 23:35:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/82e55b46-c2d2-4bdc-9ba8-2d9fa910da0f/audio.mp3" length="6325721" type="audio/mpeg"/><itunes:duration>06:35</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>bonus</itunes:episodeType><itunes:summary>We are in the middle of a worldwide pandemic (COVID-19), a recession is here, a depression might be coming, and everyone is remote! Everything has changed.</itunes:summary><itunes:author>Ayman Elsawah (@coffeewithayman)</itunes:author></item><item><title>Syntax - Arrested Teenager to Motorcycle Racer To Pentester</title><itunes:title>Syntax - Arrested Teenager to Motorcycle Racer To Pentester</itunes:title><description><![CDATA[<p>Syntax, an internal pentester for a large organization, had an interesting ride into infosec, filled with pitstops, detours, and countersteering along the way. At an early age, he was influenced by his father, got started hacking, and was wrongfully arrested for reporting a vulnerability in his High School. Hear his exciting journey into infosec, filled with life lessons.</p>
<p><strong>Shownotes</strong></p>
<ul>
<li>Was arrested in High School for disclosing a vulnerability in the school IT system</li>
<li>Went to college for computer science, but dropped out</li>
<li>Inspired by the movie hackers</li>
<li>His first computer had a 1MB hard drive (yes, not a typo!)</li>
<li>Still went to Defcon even when he was not in IT or working in security</li>
<li>Was a professional motorcycle racer</li>
<li>Kept all his rejection letters as a way of motivation to keep going</li>
<li>Had some business and entrepreneurial experience in the past, which helped him get back into the field</li>
<li>Got back into security through&hellip; IT!</li>
</ul><br/>
<p><strong>Quotes</strong></p>
<ul>
<li>"A lot of our time is spent arguing with the other departments and justifying our findings." [2:58]</li>
<li>"Is this cross-site scripting really a problem?"</li>
<li>"I get stuck a lot&hellip; it's kind of the nature of the beast." [5:17]</li>
<li>"I'm not going to work in tech again." [12:21]</li>
<li>"You're a motorcycle mechanic&hellip; why should we hire you?"[19:07]</li>
<li>"It's my hacker family. These are my people. Everyone in security, they make sense to me, cause they're all kinda like me."&nbsp;[19:41]</li>
<li>"I kept getting [these] projects coming my way and I constantly said, 'YES.'" [22:07]</li>
<li>"Have you done this before? &hellip; no, but I'll learn!" [25:06]"</li>
<li>"Because I had that mindset&hellip; I was seeing [from a] different [perspective] than other analysts." [26:00]</li>
</ul><br/>
<p><strong>Links</strong></p>
<ul>
<li>Syntax on Twitter:&nbsp; <a href="https://twitter.com/syntax976">https://twitter.com/syntax976</a></li>
<li>DCZIA: <a href="http://dczia.net/">http://dczia.net/</a></li>
<li>Queercon: <a href="https://www.queercon.org/">https://www.queercon.org/</a></li>
<li>Outro Music: "Pure Decking" by Patient Zero from the album "Screen Saviour" her link is <a href="http://patientzero.bandcamp.com/">http://patientzero.bandcamp.com</a> and she is @DoctorKraft on the Twitter</li>
</ul><br/>
<p><strong>Getting Into Infosec</strong></p>
<ul>
<li>Breaking IN: A Practical Guide to Starting a Career in Information Security: <a href="https://www.amazon.com/dp/B07N15GTPC/%5C%5D(https://www.amazon.com/dp/B07N15GTPC/)">https://www.amazon.com/dp/B07N15GTPC/</a></li>
<li>T-Shirts, Mugs, and more: <a href="https://gettingintoinfosec.com/shop/%5C%5D(https://gettingintoinfosec.com/shop/)">https://gettingintoinfosec.com/shop/</a></li>
<li>Sign up for sneak peeks, updates, and commentary:<a href="https://pages.gettingintoinfosec.com/subscribe%5C%5D(https://pages.gettingintoinfosec.com/subscribe)"> https://pages.gettingintoinfosec.com/subscribe</a></li>
</ul><br/><p>See <a href="https://omnystudio.com/listener">omnystudio.com/listener</a> for privacy information.</p><p>Mentioned in this episode:</p><p><a href="https://getting-into-infosec.captivate.fm/stayintouch">Stay In Touch</a></p>]]></description><content:encoded><![CDATA[<p>Syntax, an internal pentester for a large organization, had an interesting ride into infosec, filled with pitstops, detours, and countersteering along the way. At an early age, he was influenced by his father, got started hacking, and was wrongfully arrested for reporting a vulnerability in his High School. Hear his exciting journey into infosec, filled with life lessons.</p>
<p><strong>Shownotes</strong></p>
<ul>
<li>Was arrested in High School for disclosing a vulnerability in the school IT system</li>
<li>Went to college for computer science, but dropped out</li>
<li>Inspired by the movie hackers</li>
<li>His first computer had a 1MB hard drive (yes, not a typo!)</li>
<li>Still went to Defcon even when he was not in IT or working in security</li>
<li>Was a professional motorcycle racer</li>
<li>Kept all his rejection letters as a way of motivation to keep going</li>
<li>Had some business and entrepreneurial experience in the past, which helped him get back into the field</li>
<li>Got back into security through&hellip; IT!</li>
</ul><br/>
<p><strong>Quotes</strong></p>
<ul>
<li>"A lot of our time is spent arguing with the other departments and justifying our findings." [2:58]</li>
<li>"Is this cross-site scripting really a problem?"</li>
<li>"I get stuck a lot&hellip; it's kind of the nature of the beast." [5:17]</li>
<li>"I'm not going to work in tech again." [12:21]</li>
<li>"You're a motorcycle mechanic&hellip; why should we hire you?"[19:07]</li>
<li>"It's my hacker family. These are my people. Everyone in security, they make sense to me, cause they're all kinda like me."&nbsp;[19:41]</li>
<li>"I kept getting [these] projects coming my way and I constantly said, 'YES.'" [22:07]</li>
<li>"Have you done this before? &hellip; no, but I'll learn!" [25:06]"</li>
<li>"Because I had that mindset&hellip; I was seeing [from a] different [perspective] than other analysts." [26:00]</li>
</ul><br/>
<p><strong>Links</strong></p>
<ul>
<li>Syntax on Twitter:&nbsp; <a href="https://twitter.com/syntax976">https://twitter.com/syntax976</a></li>
<li>DCZIA: <a href="http://dczia.net/">http://dczia.net/</a></li>
<li>Queercon: <a href="https://www.queercon.org/">https://www.queercon.org/</a></li>
<li>Outro Music: "Pure Decking" by Patient Zero from the album "Screen Saviour" her link is <a href="http://patientzero.bandcamp.com/">http://patientzero.bandcamp.com</a> and she is @DoctorKraft on the Twitter</li>
</ul><br/>
<p><strong>Getting Into Infosec</strong></p>
<ul>
<li>Breaking IN: A Practical Guide to Starting a Career in Information Security: <a href="https://www.amazon.com/dp/B07N15GTPC/%5C%5D(https://www.amazon.com/dp/B07N15GTPC/)">https://www.amazon.com/dp/B07N15GTPC/</a></li>
<li>T-Shirts, Mugs, and more: <a href="https://gettingintoinfosec.com/shop/%5C%5D(https://gettingintoinfosec.com/shop/)">https://gettingintoinfosec.com/shop/</a></li>
<li>Sign up for sneak peeks, updates, and commentary:<a href="https://pages.gettingintoinfosec.com/subscribe%5C%5D(https://pages.gettingintoinfosec.com/subscribe)"> https://pages.gettingintoinfosec.com/subscribe</a></li>
</ul><br/><p>See <a href="https://omnystudio.com/listener">omnystudio.com/listener</a> for privacy information.</p><p>Mentioned in this episode:</p><p><a href="https://getting-into-infosec.captivate.fm/stayintouch">Stay In Touch</a></p>]]></content:encoded><link><![CDATA[https://getting-into-infosec.captivate.fm/episode/syntax-arrested-teenager-to-motorcycle-racer-to-pentester]]></link><guid isPermaLink="false">5ba65c3e-b6a1-4424-b911-e2a5a09afba8</guid><itunes:image href="https://artwork.captivate.fm/8bcf3472-0a7b-4724-b315-7fab38acc862/image.jpg"/><dc:creator><![CDATA[Ayman Elsawah (@coffeewithayman)]]></dc:creator><pubDate>Tue, 10 Mar 2020 09:47:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/b55e483b-88eb-47fe-8cac-6ddaf2ac9c3a/audio.mp3" length="45554122" type="audio/mpeg"/><itunes:duration>47:27</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>31</itunes:episode><podcast:episode>31</podcast:episode><itunes:summary>Syntax had an interesting ride into infosec filled with pitstops, detours, and countersteering along the way. He got started at an early age influenced by his father and was wrongfully arrested for reporting a vulnerability in his High School. Hear his exciting journey into infosec, filled with life lessons.</itunes:summary><itunes:author>Ayman Elsawah (@coffeewithayman)</itunes:author></item><item><title>Bonus - Cyber Security Job Search Frustrations (Ivan)</title><itunes:title>Bonus - Cyber Security Job Search Frustrations (Ivan)</itunes:title><description><![CDATA[<p>These are quick hallway conversations with recent graduates discussing the difficulties they've faced in their job search. I did not know any of these people before interviewing, and it's the first time I'm asking them these questions. This was recorded at RSA Conference 2020.</p>
<p><strong>Getting Into Infosec:</strong></p>
<ul>
<li>Breaking IN: A Practical Guide to Starting a Career in Information Security:&nbsp;<a href="https://www.amazon.com/dp/B07N15GTPC/"><strong>https://www.amazon.com/dp/B07N15GTPC/</strong></a></li>
<li>T-Shirts, Mugs, and more:&nbsp;<a href="https://gettingintoinfosec.com/shop/"><strong>https://gettingintoinfosec.com/shop/</strong></a></li>
<li>Sign up for sneak peeks, updates, and commentary: <a href="https://pages.gettingintoinfosec.com/subscribe"><strong>https://pages.gettingintoinfosec.com/subscribe</strong></a></li>
</ul><br/><p>See <a href="https://omnystudio.com/listener">omnystudio.com/listener</a> for privacy information.</p><p>Mentioned in this episode:</p><p><a href="https://getting-into-infosec.captivate.fm/stayintouch">Stay In Touch</a></p>]]></description><content:encoded><![CDATA[<p>These are quick hallway conversations with recent graduates discussing the difficulties they've faced in their job search. I did not know any of these people before interviewing, and it's the first time I'm asking them these questions. This was recorded at RSA Conference 2020.</p>
<p><strong>Getting Into Infosec:</strong></p>
<ul>
<li>Breaking IN: A Practical Guide to Starting a Career in Information Security:&nbsp;<a href="https://www.amazon.com/dp/B07N15GTPC/"><strong>https://www.amazon.com/dp/B07N15GTPC/</strong></a></li>
<li>T-Shirts, Mugs, and more:&nbsp;<a href="https://gettingintoinfosec.com/shop/"><strong>https://gettingintoinfosec.com/shop/</strong></a></li>
<li>Sign up for sneak peeks, updates, and commentary: <a href="https://pages.gettingintoinfosec.com/subscribe"><strong>https://pages.gettingintoinfosec.com/subscribe</strong></a></li>
</ul><br/><p>See <a href="https://omnystudio.com/listener">omnystudio.com/listener</a> for privacy information.</p><p>Mentioned in this episode:</p><p><a href="https://getting-into-infosec.captivate.fm/stayintouch">Stay In Touch</a></p>]]></content:encoded><link><![CDATA[https://getting-into-infosec.captivate.fm/episode/bonus-cyber-security-job-search-frustrations-ivan]]></link><guid isPermaLink="false">c2214d5d-6015-478d-bc5c-9ebc2423c03f</guid><itunes:image href="https://artwork.captivate.fm/026df6c9-decb-4603-8f25-fb66cc7cfeac/image.jpg"/><dc:creator><![CDATA[Ayman Elsawah (@coffeewithayman)]]></dc:creator><pubDate>Sat, 07 Mar 2020 16:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/893e71e3-e7d0-4634-b0f9-663ffb557173/audio.mp3" length="2605883" type="audio/mpeg"/><itunes:duration>02:43</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>bonus</itunes:episodeType><itunes:summary>Random interviews with people who are actively searching for cybersecurity / infosec jobs in the field. Ivan.</itunes:summary><itunes:author>Ayman Elsawah (@coffeewithayman)</itunes:author></item><item><title>Bonus - Cyber Security Job Search Frustrations (Zoe)</title><itunes:title>Bonus - Cyber Security Job Search Frustrations (Zoe)</itunes:title><description><![CDATA[<p>These are quick hallway conversations with recent graduates discussing the difficulties they've faced in their job search. I did not know any of these people before interviewing, and it's the first time I'm asking them these questions. This was recorded at RSA Conference 2020.</p><p><strong>Getting Into Infosec:</strong></p><ul><li>Breaking IN: A Practical Guide to Starting a Career in Information Security: <a href="https://www.amazon.com/dp/B07N15GTPC/"><strong>https://www.amazon.com/dp/B07N15GTPC/</strong></a></li><li>T-Shirts, Mugs, and more: <a href="https://gettingintoinfosec.com/shop/"><strong>https://gettingintoinfosec.com/shop/</strong></a></li><li>Sign up for sneak peaks, updates, and commentary: <a href="https://pages.gettingintoinfosec.com/subscribe"><strong>https://pages.gettingintoinfosec.com/subscribe</strong></a></li></ul><br/><p>See <a href="https://omnystudio.com/listener">omnystudio.com/listener</a> for privacy information.</p><p>Mentioned in this episode:</p><p><a href="https://getting-into-infosec.captivate.fm/stayintouch">Stay In Touch</a></p>]]></description><content:encoded><![CDATA[<p>These are quick hallway conversations with recent graduates discussing the difficulties they've faced in their job search. I did not know any of these people before interviewing, and it's the first time I'm asking them these questions. This was recorded at RSA Conference 2020.</p><p><strong>Getting Into Infosec:</strong></p><ul><li>Breaking IN: A Practical Guide to Starting a Career in Information Security: <a href="https://www.amazon.com/dp/B07N15GTPC/"><strong>https://www.amazon.com/dp/B07N15GTPC/</strong></a></li><li>T-Shirts, Mugs, and more: <a href="https://gettingintoinfosec.com/shop/"><strong>https://gettingintoinfosec.com/shop/</strong></a></li><li>Sign up for sneak peaks, updates, and commentary: <a href="https://pages.gettingintoinfosec.com/subscribe"><strong>https://pages.gettingintoinfosec.com/subscribe</strong></a></li></ul><br/><p>See <a href="https://omnystudio.com/listener">omnystudio.com/listener</a> for privacy information.</p><p>Mentioned in this episode:</p><p><a href="https://getting-into-infosec.captivate.fm/stayintouch">Stay In Touch</a></p>]]></content:encoded><link><![CDATA[https://getting-into-infosec.captivate.fm/episode/bonus-cyber-security-job-search-frustrations-zoe]]></link><guid isPermaLink="false">e4412e57-5e16-4cbf-8fcc-f6d901dfa71a</guid><itunes:image href="https://artwork.captivate.fm/df7c1571-6cd4-4923-9e2e-1cf3dc4acd8a/image.jpg"/><dc:creator><![CDATA[Ayman Elsawah (@coffeewithayman)]]></dc:creator><pubDate>Fri, 06 Mar 2020 14:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/ed9b6c5b-98ee-4e2a-b290-f8e5f1d3634b/audio.mp3" length="4794734" type="audio/mpeg"/><itunes:duration>05:00</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>bonus</itunes:episodeType><itunes:summary>Random interviews with people who are actively searching for cybersecurity / infosec jobs in the field. Zoe.</itunes:summary><itunes:author>Ayman Elsawah (@coffeewithayman)</itunes:author></item><item><title>Bonus - Cyber Security Job Search Frustrations (Jayesh)</title><itunes:title>Bonus - Cyber Security Job Search Frustrations (Jayesh)</itunes:title><description><![CDATA[<p>These are quick hallway conversations with recent graduates discussing the difficulties they've faced in their job search. I did not know any of these people before interviewing, and it's the first time I'm asking them these questions. This was recorded at RSA Conference 2020.</p>
<p><strong>Getting Into Infosec:</strong></p>
<ul>
<li>Breaking IN: A Practical Guide to Starting a Career in Information Security:&nbsp;<a href="https://www.amazon.com/dp/B07N15GTPC/"><strong>https://www.amazon.com/dp/B07N15GTPC/</strong></a></li>
<li>T-Shirts, Mugs, and more:&nbsp;<a href="https://gettingintoinfosec.com/shop/"><strong>https://gettingintoinfosec.com/shop/</strong></a></li>
<li>Sign up for sneak peeks, updates, and commentary: <a href="https://pages.gettingintoinfosec.com/subscribe"><strong>https://pages.gettingintoinfosec.com/subscribe</strong></a></li>
</ul><br/><p>See <a href="https://omnystudio.com/listener">omnystudio.com/listener</a> for privacy information.</p><p>Mentioned in this episode:</p><p><a href="https://getting-into-infosec.captivate.fm/stayintouch">Stay In Touch</a></p>]]></description><content:encoded><![CDATA[<p>These are quick hallway conversations with recent graduates discussing the difficulties they've faced in their job search. I did not know any of these people before interviewing, and it's the first time I'm asking them these questions. This was recorded at RSA Conference 2020.</p>
<p><strong>Getting Into Infosec:</strong></p>
<ul>
<li>Breaking IN: A Practical Guide to Starting a Career in Information Security:&nbsp;<a href="https://www.amazon.com/dp/B07N15GTPC/"><strong>https://www.amazon.com/dp/B07N15GTPC/</strong></a></li>
<li>T-Shirts, Mugs, and more:&nbsp;<a href="https://gettingintoinfosec.com/shop/"><strong>https://gettingintoinfosec.com/shop/</strong></a></li>
<li>Sign up for sneak peeks, updates, and commentary: <a href="https://pages.gettingintoinfosec.com/subscribe"><strong>https://pages.gettingintoinfosec.com/subscribe</strong></a></li>
</ul><br/><p>See <a href="https://omnystudio.com/listener">omnystudio.com/listener</a> for privacy information.</p><p>Mentioned in this episode:</p><p><a href="https://getting-into-infosec.captivate.fm/stayintouch">Stay In Touch</a></p>]]></content:encoded><link><![CDATA[https://getting-into-infosec.captivate.fm/episode/bonus-cyber-security-job-search-frustrations-jayesh]]></link><guid isPermaLink="false">badcc362-48cf-450d-a94e-ef5c3c7aff8e</guid><itunes:image href="https://artwork.captivate.fm/122d9031-367e-42c3-85f1-9da083d88805/image.jpg"/><dc:creator><![CDATA[Ayman Elsawah (@coffeewithayman)]]></dc:creator><pubDate>Thu, 05 Mar 2020 20:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/d6ece1da-6c0d-4820-80de-ab45877e8e41/audio.mp3" length="3830087" type="audio/mpeg"/><itunes:duration>03:59</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>bonus</itunes:episodeType><itunes:summary>Random interviews with people who are actively searching for cybersecurity / infosec jobs in the field. Jayesh.</itunes:summary><itunes:author>Ayman Elsawah (@coffeewithayman)</itunes:author></item><item><title>Bonus - David Zeichick - Cybersecurity College Professor</title><itunes:title>Bonus - David Zeichick - Cybersecurity College Professor</itunes:title><description><![CDATA[<p>So as I was at RSAC, I was trying to keep an eye out for those looking to get into the field. RSA is not usually the place for that, but I saw the NetWars tournament and figured that might be a good place to start. On my way there, I met David Zeichick, who had "College Day" on his badge. Intrigued, I asked about "College Day," and he told me all about it.</p>
<p>I sat down with him for an impromptu interview on the topic.</p>
<p><strong>Links</strong></p>
<ul>
<li>David on Twitter: <a href="https://twitter.com/dzeichick">https://twitter.com/dzeichick</a></li>
</ul><br/>
<p><strong>Getting Into Infosec:</strong></p>
<ul>
<li>Breaking IN: A Practical Guide to Starting a Career in Information Security:&nbsp;<a href="https://www.amazon.com/dp/B07N15GTPC/"><strong>https://www.amazon.com/dp/B07N15GTPC/</strong></a></li>
<li>T-Shirts, Mugs, and more:&nbsp;<a href="https://gettingintoinfosec.com/shop/"><strong>https://gettingintoinfosec.com/shop/</strong></a></li>
<li>Sign up for sneak peeks, updates, and commentary: <a href="https://pages.gettingintoinfosec.com/subscribe"><strong>https://pages.gettingintoinfosec.com/subscribe</strong></a></li>
</ul><br/><p>See <a href="https://omnystudio.com/listener">omnystudio.com/listener</a> for privacy information.</p><p>Mentioned in this episode:</p><p><a href="https://getting-into-infosec.captivate.fm/stayintouch">Stay In Touch</a></p>]]></description><content:encoded><![CDATA[<p>So as I was at RSAC, I was trying to keep an eye out for those looking to get into the field. RSA is not usually the place for that, but I saw the NetWars tournament and figured that might be a good place to start. On my way there, I met David Zeichick, who had "College Day" on his badge. Intrigued, I asked about "College Day," and he told me all about it.</p>
<p>I sat down with him for an impromptu interview on the topic.</p>
<p><strong>Links</strong></p>
<ul>
<li>David on Twitter: <a href="https://twitter.com/dzeichick">https://twitter.com/dzeichick</a></li>
</ul><br/>
<p><strong>Getting Into Infosec:</strong></p>
<ul>
<li>Breaking IN: A Practical Guide to Starting a Career in Information Security:&nbsp;<a href="https://www.amazon.com/dp/B07N15GTPC/"><strong>https://www.amazon.com/dp/B07N15GTPC/</strong></a></li>
<li>T-Shirts, Mugs, and more:&nbsp;<a href="https://gettingintoinfosec.com/shop/"><strong>https://gettingintoinfosec.com/shop/</strong></a></li>
<li>Sign up for sneak peeks, updates, and commentary: <a href="https://pages.gettingintoinfosec.com/subscribe"><strong>https://pages.gettingintoinfosec.com/subscribe</strong></a></li>
</ul><br/><p>See <a href="https://omnystudio.com/listener">omnystudio.com/listener</a> for privacy information.</p><p>Mentioned in this episode:</p><p><a href="https://getting-into-infosec.captivate.fm/stayintouch">Stay In Touch</a></p>]]></content:encoded><link><![CDATA[https://getting-into-infosec.captivate.fm/episode/bonus-david-zeichick-cybersecurity-college-professor]]></link><guid isPermaLink="false">0ef46102-acd0-4198-a286-be1b8f824423</guid><itunes:image href="https://artwork.captivate.fm/4c7d04cf-9f2e-411d-a267-c8137dcde438/image.jpg"/><dc:creator><![CDATA[Ayman Elsawah (@coffeewithayman)]]></dc:creator><pubDate>Wed, 04 Mar 2020 06:27:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/bcdce1dc-24a9-4099-9c20-e4dc71a5c563/audio.mp3" length="11424407" type="audio/mpeg"/><itunes:duration>11:54</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>bonus</itunes:episodeType><itunes:summary>An impromptu interview with a College Professor teaching cybersecurity. Recorded at RSA Conference 2020.</itunes:summary><itunes:author>Ayman Elsawah (@coffeewithayman)</itunes:author></item><item><title>Tanya Janca - From Insecure Developer to Appsec, Diversity/Inclusion Advocate, and Mentor</title><itunes:title>Tanya Janca - From Insecure Developer to Appsec, Diversity/Inclusion Advocate, and Mentor</itunes:title><description><![CDATA[<p><strong>BIO</strong></p>
<p>Tanya Janca, also known as SheHacksPurple, is the author of &lsquo;Alice and Bob Learn Application Security.&rsquo; She is also the founder of We Hack Purple, an online learning academy, community, and podcast that revolves around teaching&nbsp;<em>everyone</em> to create secure software. Tanya has been coding and working in IT for over twenty years, won numerous awards, and has been everywhere from startups to public service to tech giants (Microsoft, Adobe, &amp; Nokia). She has worn many hats: startup founder, pentester, CISO, AppSec Engineer, and software developer. She is an award-winning public speaker, active blogger &amp; streamer and has delivered hundreds of talks and trainings on 6 continents. She values diversity, inclusion, and kindness, which shines through in her countless initiatives.</p>
<p>Founder: We Hack Purple (Academy, Community, and Podcast), WoSEC International (Women of Security), OWASP DevSlop, OWASP Victoria, #CyberMentoringMonday</p>
<p><strong>Notes</strong></p>
<ul>
<li>Part of security is teaching security</li>
<li>Started in software development, then starting meeting hackers, and decided to switch to security.</li>
<li>Tanya is extremely scholastically inclined</li>
<li>She comes from a family full of women computer scientists, technologists, and mathematicians!
<ul>
<li>Her aunt was the FIRST to graduate in CS from Ontario.</li>
<li>Her mother was a mathematician.</li>
<li>She had four uncles in computer science.</li>
</ul><br/>
</li>
</ul><br/>
<p><strong>Tanya's Quick List For Getting Into Infosec</strong></p>
<ul>
<li>Responsibility of a mentee: [30:29]
<ul>
<li>Have energy and time</li>
<li>Respect your mentor's time</li>
<li>Need to have already looked for the answer online before you ever ask them for something</li>
<li>They are not a free consultant; you shouldn't ask them to do your work</li>
<li>You shouldn't stand them up for meetings</li>
<li>Recognize and have gratitude for the fact that this person has a crap-ton of knowledge in their brain that they're sharing with you for free. They're taking the time out. You're not their daughter or son. You're not their friend. You're a person in their industry, and they're trying to pay it forward.</li>
<li>You want to actually do the exercises that your mentor gives you</li>
<li>Choose your mentor wisely</li>
<li>Do not expect your mentor to find you a job</li>
</ul><br/>
</li>
</ul><br/>
<p><strong>Quotes</strong></p>
<ul>
<li>"We're graduating people who don't know how to make secure software, but they do know how to make software!&nbsp; So that ends up being insecure software." [4:57]</li>
<li>"So if I [were] going to teach a software security course at a university, they would pay me as an adjunct professor, and they would pay me almost nothing. It would almost be equivalent to volunteer work." [5:35]</li>
<li>"I thought I really wanted to be a penetration tester until I discovered that there is this weird spot&hellip; in between red team and blue team." [10:17]</li>
<li>"A lot of penetration testers get a little depressed."[11:07]</li>
<li>"People just don't know how many super awesome cool things there are out there!" [15:11]</li>
<li>"The people I liked the best are the people in my computer science class." [22:24]</li>
<li>"Honestly, I just smoked a lot of weed and just showed up and would ace things." [22:12]</li>
<li>"You don't have to spend money at the beginning necessarily." [31:58]</li>
<li>"Which certification should I get so that I can be a good pentester?" [31:34]</li>
<li>"I don't know enough to be a mentor." [31:50]</li>
</ul><br/>
<p><strong>Links</strong></p>
<ul>
<li>Tanya Online
<ul>
<li>Personal Site:&nbsp;<a href="https://dev.to/shehackspurple">https://dev.to/shehackspurple</a></li>
<li>Twitter:&nbsp;<a href="https://twitter.com/shehackspurple">https://twitter.com/shehackspurple</a></li>
<li>Pushing Left Series:&nbsp;<a...]]></description><content:encoded><![CDATA[<p><strong>BIO</strong></p>
<p>Tanya Janca, also known as SheHacksPurple, is the author of &lsquo;Alice and Bob Learn Application Security.&rsquo; She is also the founder of We Hack Purple, an online learning academy, community, and podcast that revolves around teaching&nbsp;<em>everyone</em> to create secure software. Tanya has been coding and working in IT for over twenty years, won numerous awards, and has been everywhere from startups to public service to tech giants (Microsoft, Adobe, &amp; Nokia). She has worn many hats: startup founder, pentester, CISO, AppSec Engineer, and software developer. She is an award-winning public speaker, active blogger &amp; streamer and has delivered hundreds of talks and trainings on 6 continents. She values diversity, inclusion, and kindness, which shines through in her countless initiatives.</p>
<p>Founder: We Hack Purple (Academy, Community, and Podcast), WoSEC International (Women of Security), OWASP DevSlop, OWASP Victoria, #CyberMentoringMonday</p>
<p><strong>Notes</strong></p>
<ul>
<li>Part of security is teaching security</li>
<li>Started in software development, then starting meeting hackers, and decided to switch to security.</li>
<li>Tanya is extremely scholastically inclined</li>
<li>She comes from a family full of women computer scientists, technologists, and mathematicians!
<ul>
<li>Her aunt was the FIRST to graduate in CS from Ontario.</li>
<li>Her mother was a mathematician.</li>
<li>She had four uncles in computer science.</li>
</ul><br/>
</li>
</ul><br/>
<p><strong>Tanya's Quick List For Getting Into Infosec</strong></p>
<ul>
<li>Responsibility of a mentee: [30:29]
<ul>
<li>Have energy and time</li>
<li>Respect your mentor's time</li>
<li>Need to have already looked for the answer online before you ever ask them for something</li>
<li>They are not a free consultant; you shouldn't ask them to do your work</li>
<li>You shouldn't stand them up for meetings</li>
<li>Recognize and have gratitude for the fact that this person has a crap-ton of knowledge in their brain that they're sharing with you for free. They're taking the time out. You're not their daughter or son. You're not their friend. You're a person in their industry, and they're trying to pay it forward.</li>
<li>You want to actually do the exercises that your mentor gives you</li>
<li>Choose your mentor wisely</li>
<li>Do not expect your mentor to find you a job</li>
</ul><br/>
</li>
</ul><br/>
<p><strong>Quotes</strong></p>
<ul>
<li>"We're graduating people who don't know how to make secure software, but they do know how to make software!&nbsp; So that ends up being insecure software." [4:57]</li>
<li>"So if I [were] going to teach a software security course at a university, they would pay me as an adjunct professor, and they would pay me almost nothing. It would almost be equivalent to volunteer work." [5:35]</li>
<li>"I thought I really wanted to be a penetration tester until I discovered that there is this weird spot&hellip; in between red team and blue team." [10:17]</li>
<li>"A lot of penetration testers get a little depressed."[11:07]</li>
<li>"People just don't know how many super awesome cool things there are out there!" [15:11]</li>
<li>"The people I liked the best are the people in my computer science class." [22:24]</li>
<li>"Honestly, I just smoked a lot of weed and just showed up and would ace things." [22:12]</li>
<li>"You don't have to spend money at the beginning necessarily." [31:58]</li>
<li>"Which certification should I get so that I can be a good pentester?" [31:34]</li>
<li>"I don't know enough to be a mentor." [31:50]</li>
</ul><br/>
<p><strong>Links</strong></p>
<ul>
<li>Tanya Online
<ul>
<li>Personal Site:&nbsp;<a href="https://dev.to/shehackspurple">https://dev.to/shehackspurple</a></li>
<li>Twitter:&nbsp;<a href="https://twitter.com/shehackspurple">https://twitter.com/shehackspurple</a></li>
<li>Pushing Left Series:&nbsp;<a href="https://code.likeagirl.io/pushing-left-like-a-boss-part-1-80f1f007da95">https://code.likeagirl.io/pushing-left-like-a-boss-part-1-80f1f007da95</a></li>
</ul><br/>
</li>
<li>NICE Framework:&nbsp;<a href="https://www.nist.gov/itl/applied-cybersecurity/nice/nice-cybersecurity-workforce-framework-resource-center">https://www.nist.gov/itl/applied-cybersecurity/nice/nice-cybersecurity-workforce-framework-resource-center</a></li>
<li>OWASP:&nbsp;<a href="https://owasp.org/">https://owasp.org/</a></li>
<li>WoSec: <a href="https://wearetechwomen.com/wosec-women-of-security/">https://wearetechwomen.com/wosec-women-of-security/</a></li>
<li>Franziska B&uuml;hler&nbsp;<a href="https://twitter.com/bufrasch">https://twitter.com/bufrasch</a></li>
</ul><br/>
<p><strong>Getting Into Infosec</strong></p>
<ul>
<li>Breaking IN: A Practical Guide to Starting a Career in Information Security: <a href="https://www.amazon.com/dp/B07N15GTPC/">https://www.amazon.com/dp/B07N15GTPC/</a></li>
<li>T-Shirts, Mugs, and more: <a href="https://gettingintoinfosec.com/shop/">https://gettingintoinfosec.com/shop/</a></li>
<li>Sign up for sneak peeks, updates, and commentary: <a href="https://pages.gettingintoinfosec.com/subscribe">https://pages.gettingintoinfosec.com/subscribe</a></li>
</ul><br/><p>See <a href="https://omnystudio.com/listener">omnystudio.com/listener</a> for privacy information.</p><p>Mentioned in this episode:</p><p><a href="https://getting-into-infosec.captivate.fm/stayintouch">Stay In Touch</a></p>]]></content:encoded><link><![CDATA[https://getting-into-infosec.captivate.fm/episode/tanya-janca-from-insecure-developer-to-appsec-diversity-inclusion-advocate-and-mentor]]></link><guid isPermaLink="false">0ec06ed6-0e69-4d5c-9d58-9c64d452fa8c</guid><itunes:image href="https://artwork.captivate.fm/9c68ffee-dee5-4ffe-b19d-eeae6c7fd8ff/image.jpg"/><dc:creator><![CDATA[Ayman Elsawah (@coffeewithayman)]]></dc:creator><pubDate>Sun, 23 Feb 2020 18:05:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/eedfd704-b819-4804-9a7a-a2c3f83c633b/audio.mp3" length="37430697" type="audio/mpeg"/><itunes:duration>38:59</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>30</itunes:episode><podcast:episode>30</podcast:episode><itunes:summary>Tanya is an awesome giving person. She&apos;s a huge proponent of mentoring, diversity and inclusion, and application security. She&apos;s quite involved in the community from starting her own company, to running her own OWASP chapter for 4 years in Ottawa, founding a new OWASP chapter in Victoria, and co-founding the international women’s organization WoSEC. Her full BIO below...</itunes:summary><itunes:author>Ayman Elsawah (@coffeewithayman)</itunes:author></item><item><title>Nick Vissari - Engineering Dropout to Math Tutor to Security Architect/Engineer</title><itunes:title>Nick Vissari - Engineering Dropout to Math Tutor to Security Architect/Engineer</itunes:title><description><![CDATA[<p>Nick Vissari went from being an engineering dropout (he didn't like creative writing) to a tech consultant to a math tutor. His penchant for fixing things homed him back into tech, where he is now responsible for security in a large school district. He recently went back to school and received his cybersecurity degree as well.</p>
<p><strong>Notes</strong></p>
<ul>
<li>At 10-years-old, his Dad had problems putting the computer together, so he helped his dad</li>
<li>Family never stifled any inquisitiveness he had</li>
<li>Started as a math tutor at the school system</li>
<li>How he initially had the wrong attitude in security</li>
</ul><br/>
<p><strong>Quotes:</strong></p>
<ul>
<li>"Once you get into a position somewhere, do whatever you can to make yourself invaluable. Find the things people don't want to do and do them. The hard problems are the ones most rewarding."&nbsp;</li>
<li>"If you're not automating right now, it's probably because you have more resources than you know what to do with."&nbsp;</li>
<li>"There are a lot of people that are security professionals, but they really don&rsquo;t know about how a system works."</li>
<li>"Just got to have that passion for wanting to learn and you can definitely jump into security."</li>
<li>"My grandmother always said: 'Those who don't make mistakes, don't do much.' So get out there a make a bunch of mistakes."</li>
<li>"Don't be that guy that says 'No' to everything."</li>
</ul><br/>
<p><strong>Links</strong></p>
<ul>
<li>Nick on Twitter: <a href="https://twitter.com/nickadam">https://twitter.com/nickadam</a></li>
<li>sslstrip by Moxie: <a href="https://github.com/moxie0/sslstrip">https://github.com/moxie0/sslstrip</a></li>
<li>Firesheep plugin: <a href="https://en.wikipedia.org/wiki/Firesheep">https://en.wikipedia.org/wiki/Firesheep</a></li>
</ul><br/>
<p><strong>Getting Into Infosec</strong></p>
<ul>
<li>Checkout My Book: Breaking IN: A Practical Guide to Starting a Career in Information Security: <a href="https://www.amazon.com/dp/B07N15GTPC/">https://www.amazon.com/dp/B07N15GTPC/</a></li>
<li>T-Shirts, Mugs, and more: <a href="https://gettingintoinfosec.com/shop/">https://gettingintoinfosec.com/shop/</a></li>
<li>Sign up for sneak peeks, updates, and commentary: <a href="https://pages.gettingintoinfosec.com/subscribe">https://pages.gettingintoinfosec.com/subscribe</a></li>
</ul><br/><p>See <a href="https://omnystudio.com/listener">omnystudio.com/listener</a> for privacy information.</p><p>Mentioned in this episode:</p><p><a href="https://getting-into-infosec.captivate.fm/stayintouch">Stay In Touch</a></p>]]></description><content:encoded><![CDATA[<p>Nick Vissari went from being an engineering dropout (he didn't like creative writing) to a tech consultant to a math tutor. His penchant for fixing things homed him back into tech, where he is now responsible for security in a large school district. He recently went back to school and received his cybersecurity degree as well.</p>
<p><strong>Notes</strong></p>
<ul>
<li>At 10-years-old, his Dad had problems putting the computer together, so he helped his dad</li>
<li>Family never stifled any inquisitiveness he had</li>
<li>Started as a math tutor at the school system</li>
<li>How he initially had the wrong attitude in security</li>
</ul><br/>
<p><strong>Quotes:</strong></p>
<ul>
<li>"Once you get into a position somewhere, do whatever you can to make yourself invaluable. Find the things people don't want to do and do them. The hard problems are the ones most rewarding."&nbsp;</li>
<li>"If you're not automating right now, it's probably because you have more resources than you know what to do with."&nbsp;</li>
<li>"There are a lot of people that are security professionals, but they really don&rsquo;t know about how a system works."</li>
<li>"Just got to have that passion for wanting to learn and you can definitely jump into security."</li>
<li>"My grandmother always said: 'Those who don't make mistakes, don't do much.' So get out there a make a bunch of mistakes."</li>
<li>"Don't be that guy that says 'No' to everything."</li>
</ul><br/>
<p><strong>Links</strong></p>
<ul>
<li>Nick on Twitter: <a href="https://twitter.com/nickadam">https://twitter.com/nickadam</a></li>
<li>sslstrip by Moxie: <a href="https://github.com/moxie0/sslstrip">https://github.com/moxie0/sslstrip</a></li>
<li>Firesheep plugin: <a href="https://en.wikipedia.org/wiki/Firesheep">https://en.wikipedia.org/wiki/Firesheep</a></li>
</ul><br/>
<p><strong>Getting Into Infosec</strong></p>
<ul>
<li>Checkout My Book: Breaking IN: A Practical Guide to Starting a Career in Information Security: <a href="https://www.amazon.com/dp/B07N15GTPC/">https://www.amazon.com/dp/B07N15GTPC/</a></li>
<li>T-Shirts, Mugs, and more: <a href="https://gettingintoinfosec.com/shop/">https://gettingintoinfosec.com/shop/</a></li>
<li>Sign up for sneak peeks, updates, and commentary: <a href="https://pages.gettingintoinfosec.com/subscribe">https://pages.gettingintoinfosec.com/subscribe</a></li>
</ul><br/><p>See <a href="https://omnystudio.com/listener">omnystudio.com/listener</a> for privacy information.</p><p>Mentioned in this episode:</p><p><a href="https://getting-into-infosec.captivate.fm/stayintouch">Stay In Touch</a></p>]]></content:encoded><link><![CDATA[https://getting-into-infosec.captivate.fm/episode/nick-vissari-engineering-dropout-to-math-tutor-to-security-architect-engineer]]></link><guid isPermaLink="false">2f63f4db-3957-485d-8aa4-517c872410b5</guid><itunes:image href="https://artwork.captivate.fm/a5185380-9066-488d-88a2-82b4e205791a/image.jpg"/><dc:creator><![CDATA[Ayman Elsawah (@coffeewithayman)]]></dc:creator><pubDate>Tue, 04 Feb 2020 00:03:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/0b72fa9e-d265-4f33-b3fc-95fb532f3886/audio.mp3" length="34243330" type="audio/mpeg"/><itunes:duration>35:40</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>29</itunes:episode><podcast:episode>29</podcast:episode><itunes:summary>Nick Vissari went from being an engineering dropout (he didn&apos;t like creative writing) to tech consultant to math tutor. His penchant for fixing things homed him back into tech where he is now responsible for security at a large school district. He recently went back to school and received his cybersecurity degree as well.</itunes:summary><itunes:author>Ayman Elsawah (@coffeewithayman)</itunes:author></item><item><title>Page Glave - Professor of Kinesiology to Cybersecurity Analyst!</title><itunes:title>Page Glave - Professor of Kinesiology to Cybersecurity Analyst!</itunes:title><description><![CDATA[<p>Page Glave was a tenured Associate Professor of Kinesiology with a focus in exercise science and was successful in her field. However, she came to the realization that she can't see herself doing this for the rest of her life. She offers lots of great advice on resume tips when switching, homelabs, certifications, and how she was able to break into the field. This is her story.&nbsp;</p>
<p><strong>BIO</strong></p>
<p>I am an analyst, project manager, ethical hacker, and tech consultant with more than 10 years&rsquo; experience with research and project management. I spent a while in higher education &ndash; long enough to get tenure and decide it was time to do something else. I have eJPT (eLearnSecurity Junior Penetration Tester), Security+ and Splunk User certifications. I love learning and tech, so digging into all of this stuff just makes me happy.</p>
<p><strong>Notes:</strong></p>
<ul>
<li>5-months into her first security job!</li>
<li>Being in a small environment, she gets to do everything from governance to pentesting</li>
<li>Previous to this, she was a tenured associate professor in kinesiology, focusing on biomechanics and obesity.</li>
</ul><br/>
<p><strong>Quotes:</strong></p>
<ul>
<li>"Pretty big adventure on a daily basis because no day is the same."</li>
<li>"Really is an environment where security is everyone's job."</li>
<li>"I think I'll always be in-house tech support for as long as I live." [7:08]</li>
<li>"I kinda got bored&hellip; I didn't want to keep doing something that wasn't challenging." [7:28]</li>
<li>"Do I really want to do this for the next 30 years?" [7:58]</li>
<li>"&hellip;going through the headers, that should have been a clue that maybe tech would have been a good fit for me."</li>
<li>"You'd be hard-pressed to find anyone in Information Security who was just thrilled with their budgets."</li>
<li>"Being able to translate that self-directed learning to something on my resume."</li>
</ul><br/>
<p><strong>Links:</strong></p>
<ul>
<li>Page's Twitter: <a href="https://twitter.com/pageinsec">https://twitter.com/pageinsec</a> (<a href="https://twitter.com/intent/tweet?text=.@pageinsec+@coffeewithayman+Thank+You+for+a+great+episode!">Thank her via Twitter</a>)</li>
<li>Breaking Down Security Podcast: <a href="https://www.brakeingsecurity.com/">https://www.brakeingsecurity.com/</a></li>
<li>Pacific Hacker's Conference: <a href="https://phack.org/">https://phack.org/</a></li>
<li>Sam Bowne's Class: <a href="https://samsclass.info/">https://samsclass.info/</a></li>
<li>Skadi VM: <a href="https://www.skadivm.com/">https://www.skadivm.com/</a> (by Alan Orlikoski <a href="https://twitter.com/AlanOrlikoski">https://twitter.com/AlanOrlikoski</a>)</li>
<li>Marco Palacios: <a href="https://twitter.com/MPalacios_Cyber">https://twitter.com/MPalacios_Cyber</a></li>
<li>Keirsten Brager: <a href="https://twitter.com/KeirstenBrager">https://twitter.com/KeirstenBrager</a></li>
<li>Intro Music: <a href="https://trash80.com/#/content/133/weeklybeats-2012-week5">https://trash80.com/#/content/133/weeklybeats-2012-week5</a></li>
<li>Outro Music: <a href="https://www.youtube.com/channel/UCNXDIltPLbdcAavUtL00i7g">https://www.youtube.com/channel/UCNXDIltPLbdcAavUtL00i7g</a></li>
</ul><br/>
<p><strong>Getting Into Infosec:</strong></p>
<ul>
<li>Follow Me on Twitter: <a href="https://twitter.com/coffeewithayman">https://twitter.com/coffeewithayman</a></li>
<li>Subscribe To YouTube: <a href="https://www.youtube.com/channel/UCg6gV_gdfc188HZdN8LUx4A">https://www.youtube.com/channel/UCg6gV_gdfc188HZdN8LUx4A</a></li>
<li>Checkout My Book: <a href="https://www.amazon.com/dp/B07N15GTPC/">Breaking IN: A Practical Guide to Starting a Career in Information Security</a></li>
<li>Sign up for updates and commentary: <a href="https://mailchi.mp/467573a314e5/gettingintoinfosec">https://mailchi.mp/467573a314e5/gettingintoinfosec</a></li>
<li>Website: <a...]]></description><content:encoded><![CDATA[<p>Page Glave was a tenured Associate Professor of Kinesiology with a focus in exercise science and was successful in her field. However, she came to the realization that she can't see herself doing this for the rest of her life. She offers lots of great advice on resume tips when switching, homelabs, certifications, and how she was able to break into the field. This is her story.&nbsp;</p>
<p><strong>BIO</strong></p>
<p>I am an analyst, project manager, ethical hacker, and tech consultant with more than 10 years&rsquo; experience with research and project management. I spent a while in higher education &ndash; long enough to get tenure and decide it was time to do something else. I have eJPT (eLearnSecurity Junior Penetration Tester), Security+ and Splunk User certifications. I love learning and tech, so digging into all of this stuff just makes me happy.</p>
<p><strong>Notes:</strong></p>
<ul>
<li>5-months into her first security job!</li>
<li>Being in a small environment, she gets to do everything from governance to pentesting</li>
<li>Previous to this, she was a tenured associate professor in kinesiology, focusing on biomechanics and obesity.</li>
</ul><br/>
<p><strong>Quotes:</strong></p>
<ul>
<li>"Pretty big adventure on a daily basis because no day is the same."</li>
<li>"Really is an environment where security is everyone's job."</li>
<li>"I think I'll always be in-house tech support for as long as I live." [7:08]</li>
<li>"I kinda got bored&hellip; I didn't want to keep doing something that wasn't challenging." [7:28]</li>
<li>"Do I really want to do this for the next 30 years?" [7:58]</li>
<li>"&hellip;going through the headers, that should have been a clue that maybe tech would have been a good fit for me."</li>
<li>"You'd be hard-pressed to find anyone in Information Security who was just thrilled with their budgets."</li>
<li>"Being able to translate that self-directed learning to something on my resume."</li>
</ul><br/>
<p><strong>Links:</strong></p>
<ul>
<li>Page's Twitter: <a href="https://twitter.com/pageinsec">https://twitter.com/pageinsec</a> (<a href="https://twitter.com/intent/tweet?text=.@pageinsec+@coffeewithayman+Thank+You+for+a+great+episode!">Thank her via Twitter</a>)</li>
<li>Breaking Down Security Podcast: <a href="https://www.brakeingsecurity.com/">https://www.brakeingsecurity.com/</a></li>
<li>Pacific Hacker's Conference: <a href="https://phack.org/">https://phack.org/</a></li>
<li>Sam Bowne's Class: <a href="https://samsclass.info/">https://samsclass.info/</a></li>
<li>Skadi VM: <a href="https://www.skadivm.com/">https://www.skadivm.com/</a> (by Alan Orlikoski <a href="https://twitter.com/AlanOrlikoski">https://twitter.com/AlanOrlikoski</a>)</li>
<li>Marco Palacios: <a href="https://twitter.com/MPalacios_Cyber">https://twitter.com/MPalacios_Cyber</a></li>
<li>Keirsten Brager: <a href="https://twitter.com/KeirstenBrager">https://twitter.com/KeirstenBrager</a></li>
<li>Intro Music: <a href="https://trash80.com/#/content/133/weeklybeats-2012-week5">https://trash80.com/#/content/133/weeklybeats-2012-week5</a></li>
<li>Outro Music: <a href="https://www.youtube.com/channel/UCNXDIltPLbdcAavUtL00i7g">https://www.youtube.com/channel/UCNXDIltPLbdcAavUtL00i7g</a></li>
</ul><br/>
<p><strong>Getting Into Infosec:</strong></p>
<ul>
<li>Follow Me on Twitter: <a href="https://twitter.com/coffeewithayman">https://twitter.com/coffeewithayman</a></li>
<li>Subscribe To YouTube: <a href="https://www.youtube.com/channel/UCg6gV_gdfc188HZdN8LUx4A">https://www.youtube.com/channel/UCg6gV_gdfc188HZdN8LUx4A</a></li>
<li>Checkout My Book: <a href="https://www.amazon.com/dp/B07N15GTPC/">Breaking IN: A Practical Guide to Starting a Career in Information Security</a></li>
<li>Sign up for updates and commentary: <a href="https://mailchi.mp/467573a314e5/gettingintoinfosec">https://mailchi.mp/467573a314e5/gettingintoinfosec</a></li>
<li>Website: <a href="https://gettingintoinfosec.com/">https://gettingintoinfosec.com</a></li>
</ul><br/><p>See <a href="https://omnystudio.com/listener">omnystudio.com/listener</a> for privacy information.</p><p>Mentioned in this episode:</p><p><a href="https://getting-into-infosec.captivate.fm/stayintouch">Stay In Touch</a></p>]]></content:encoded><link><![CDATA[https://getting-into-infosec.captivate.fm/episode/page-glave-professor-of-kinesiology-to-cybersecurity-analyst]]></link><guid isPermaLink="false">0b56c9cc-9abf-41ea-8adf-acbf57382e98</guid><itunes:image href="https://artwork.captivate.fm/b791c787-026a-48b6-8672-dd6ca5d821ad/image.jpg"/><dc:creator><![CDATA[Ayman Elsawah (@coffeewithayman)]]></dc:creator><pubDate>Sat, 16 Nov 2019 07:53:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/de0ae8e7-3d3e-43ae-b5e9-13c77de7aecc/audio.mp3" length="30091308" type="audio/mpeg"/><itunes:duration>31:21</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>28</itunes:episode><podcast:episode>28</podcast:episode><itunes:summary>Page Glave was a tenured Associate Professor of Kinesiology with a focus in exercise science and was successful in her field, on her way to full professor!  However she came to the realization that she can&apos;t see herself doing this for the rest of her life. This is her story.</itunes:summary><itunes:author>Ayman Elsawah (@coffeewithayman)</itunes:author></item><item><title>Nick Jeswald - Confessions of a Cybersecurity Recruiter (Part 2)</title><itunes:title>Nick Jeswald - Confessions of a Cybersecurity Recruiter (Part 2)</itunes:title><description><![CDATA[<p>Part 2 of 2 - Nick Jeswald has been an external and internal recruiter in security. He shares with us what he looks for in a candidate, common mistakes made by candidates, and the nuances of hackers he's learned over the years.</p>
<p><strong>Show Notes</strong></p>
<p>SEE PREVIOUS EPISODE FOR COMPLETE NOTES &amp; RECRUITING TIPS FROM NICK.</p>
<p><strong>Getting Into Infosec:</strong></p>
<ul>
<li>Follow Me on Twitter: <a href="https://twitter.com/coffeewithayman">https://twitter.com/coffeewithayman</a></li>
<li>Subscribe To YouTube: <a href="https://www.youtube.com/channel/UCg6gV_gdfc188HZdN8LUx4A">https://www.youtube.com/channel/UCg6gV_gdfc188HZdN8LUx4A</a></li>
<li>Checkout My Book: <a href="https://amzn.to/2HP2i25">https://amzn.to/2HP2i25</a></li>
<li>Sign up for updates and commentary: <a href="https://mailchi.mp/467573a314e5/gettingintoinfosec">https://mailchi.mp/467573a314e5/gettingintoinfosec</a></li>
<li>Website: <a href="https://gettingintoinfosec.com/">https://gettingintoinfosec.com</a></li>
</ul><br/><p>See <a href="https://omnystudio.com/listener">omnystudio.com/listener</a> for privacy information.</p><p>Mentioned in this episode:</p><p><a href="https://getting-into-infosec.captivate.fm/stayintouch">Stay In Touch</a></p>]]></description><content:encoded><![CDATA[<p>Part 2 of 2 - Nick Jeswald has been an external and internal recruiter in security. He shares with us what he looks for in a candidate, common mistakes made by candidates, and the nuances of hackers he's learned over the years.</p>
<p><strong>Show Notes</strong></p>
<p>SEE PREVIOUS EPISODE FOR COMPLETE NOTES &amp; RECRUITING TIPS FROM NICK.</p>
<p><strong>Getting Into Infosec:</strong></p>
<ul>
<li>Follow Me on Twitter: <a href="https://twitter.com/coffeewithayman">https://twitter.com/coffeewithayman</a></li>
<li>Subscribe To YouTube: <a href="https://www.youtube.com/channel/UCg6gV_gdfc188HZdN8LUx4A">https://www.youtube.com/channel/UCg6gV_gdfc188HZdN8LUx4A</a></li>
<li>Checkout My Book: <a href="https://amzn.to/2HP2i25">https://amzn.to/2HP2i25</a></li>
<li>Sign up for updates and commentary: <a href="https://mailchi.mp/467573a314e5/gettingintoinfosec">https://mailchi.mp/467573a314e5/gettingintoinfosec</a></li>
<li>Website: <a href="https://gettingintoinfosec.com/">https://gettingintoinfosec.com</a></li>
</ul><br/><p>See <a href="https://omnystudio.com/listener">omnystudio.com/listener</a> for privacy information.</p><p>Mentioned in this episode:</p><p><a href="https://getting-into-infosec.captivate.fm/stayintouch">Stay In Touch</a></p>]]></content:encoded><link><![CDATA[https://getting-into-infosec.captivate.fm/episode/nick-jeswald-confessions-of-a-cybersecurity-recruiter-part-2]]></link><guid isPermaLink="false">e5410457-aff2-4411-95f3-910fb9bc3a56</guid><itunes:image href="https://artwork.captivate.fm/4ace1db2-0a6e-4d89-b369-725d7ce5907c/image.jpg"/><dc:creator><![CDATA[Ayman Elsawah (@coffeewithayman)]]></dc:creator><pubDate>Sat, 02 Nov 2019 01:18:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/bc4b4fc8-ef64-47f3-97ae-81239ce72ac3/audio.mp3" length="46548034" type="audio/mpeg"/><itunes:duration>48:29</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>27</itunes:episode><podcast:episode>27</podcast:episode><itunes:summary>Part 2 of 2 - Nick Jeswald has been an external and internal recruiter in security. He shares with us what he looks for in a candidate, common mistakes made by candidates, and the nuances of hackers he&apos;s learned over the years.</itunes:summary><itunes:author>Ayman Elsawah (@coffeewithayman)</itunes:author></item><item><title>Nick Jeswald - Confessions of a Cybersecurity Recruiter (Part 1)</title><itunes:title>Nick Jeswald - Confessions of a Cybersecurity Recruiter (Part 1)</itunes:title><description><![CDATA[<p>Part 1 of 2 - Nick Jeswald has been an external and internal recruiter in security. He shares with us what he looks for in a candidate, common mistakes made by candidates, and the nuances of hackers he's learned over the years.</p>
<p><strong>BIO:</strong></p>
<p>I've been in infosec for 8 years, and in various IT roles since 1996 (Developer -&gt; Sales Engineer -&gt; BD Specialist -&gt; Security BD -&gt; Security Recruiting -&gt; Dir. Corp Dev). However, I've also been one of the top recruiters for each company I worked at whatever role I've had.</p>
<p><strong>Show Notes:</strong></p>
<ul>
<li>Internal recruiters != external recruiters
<ul>
<li>Backgrounds are different
<ul>
<li>External recruiters come from varied backgrounds, virtually zero from infosec
<ul>
<li>Much like BD people</li>
</ul><br/>
</li>
<li>Internal recruiters are more likely to have a greater understanding of infosec or at least IT</li>
<li>A recruiter that doesn't understand security is more likely to make bad placements with higher turnover</li>
</ul><br/>
</li>
<li>Motivations are far different
<ul>
<li>I want to choose people to spend a career with</li>
<li>They want to make a commission and meet SLAs</li>
</ul><br/>
</li>
<li>Attention to detail is very different
<ul>
<li>A tiny detail that could betray a hidden skill set or flaw would likely be overlooked by a 3rd party</li>
<li>I have an interest in understating the person, not just the resume
<ul>
<li>What is their desired career/life trajectory?</li>
<li>How will our company enrich/hinder that life?</li>
</ul><br/>
</li>
</ul><br/>
</li>
</ul><br/>
</li>
<li>You are in competition with an army of low-skilled counterfeits
<ul>
<li>You need to be able to demonstrate raw skills, not just list your certs</li>
<li>Have a body of work available for review on GitHub, your own site, etc.</li>
<li>Internships are a nice touch, but they cut both ways
<ul>
<li>You interned with unnamed-big-4-biz-consulting firm? Don't drag that culture in here. I fear for what you learned.</li>
</ul><br/>
</li>
<li>Can't talk about where you interned because it was a non-DOD three-letter agency? Communicate that point to me in your way. If that is the truth, I'll trace you back and verify.</li>
</ul><br/>
</li>
<li>Always be client-facing
<ul>
<li>I have seen many recruits passed over for poor hygiene, arrogant treatment of interviewers, disclosure of illegal activity, and just generally obnoxious behavior
<ul>
<li>You couldn't act like this on a client site and not get sent home; don't do it on the interview</li>
<li>Yes, you are talented...there's always someone cooler than you</li>
</ul><br/>
</li>
</ul><br/>
</li>
<li>Interview your interviewers
<ul>
<li>You should have a standing list of questions for interviewers
<ul>
<li>Why do you stay with them?</li>
<li>What is the intended growth path? Organic? IPO? Channel?</li>
<li>Is there any merger/acquisition activity going on? Planned? Intended impact?</li>
<li>Is there any rebranding activity going on? Planned? Intended impact?</li>
<li>What conditions are driving this open role? Turnover? Internal restructuring? Organizational growth?</li>
<li>Will I be supported in my security research? How?</li>
<li>Does your company have a defined mentoring path? Why not?</li>
<li>How does the company support continuing infosec education?</li>
</ul><br/>
</li>
</ul><br/>
</li>
<li>Meet your team
<ul>
<li>Watch the team interaction closely</li>
<li>Can you see cohesion? Are they supportive or adversarial? Are they authentically happy with their jobs?</li>
</ul><br/>
</li>
<li>Understand the org chart you are stepping into
<ul>
<li>To whom does security answer? CXX? IT Director? General Counsel?
<ul>
<li>Understanding this will help mitigate surprises later</li>
</ul><br/>
</li>
</ul><br/>
</li>
<li>Understand the company culture
<ul>
<li>Big corp? Big corp problems.</li>
<li>Boutique?...]]></description><content:encoded><![CDATA[<p>Part 1 of 2 - Nick Jeswald has been an external and internal recruiter in security. He shares with us what he looks for in a candidate, common mistakes made by candidates, and the nuances of hackers he's learned over the years.</p>
<p><strong>BIO:</strong></p>
<p>I've been in infosec for 8 years, and in various IT roles since 1996 (Developer -&gt; Sales Engineer -&gt; BD Specialist -&gt; Security BD -&gt; Security Recruiting -&gt; Dir. Corp Dev). However, I've also been one of the top recruiters for each company I worked at whatever role I've had.</p>
<p><strong>Show Notes:</strong></p>
<ul>
<li>Internal recruiters != external recruiters
<ul>
<li>Backgrounds are different
<ul>
<li>External recruiters come from varied backgrounds, virtually zero from infosec
<ul>
<li>Much like BD people</li>
</ul><br/>
</li>
<li>Internal recruiters are more likely to have a greater understanding of infosec or at least IT</li>
<li>A recruiter that doesn't understand security is more likely to make bad placements with higher turnover</li>
</ul><br/>
</li>
<li>Motivations are far different
<ul>
<li>I want to choose people to spend a career with</li>
<li>They want to make a commission and meet SLAs</li>
</ul><br/>
</li>
<li>Attention to detail is very different
<ul>
<li>A tiny detail that could betray a hidden skill set or flaw would likely be overlooked by a 3rd party</li>
<li>I have an interest in understating the person, not just the resume
<ul>
<li>What is their desired career/life trajectory?</li>
<li>How will our company enrich/hinder that life?</li>
</ul><br/>
</li>
</ul><br/>
</li>
</ul><br/>
</li>
<li>You are in competition with an army of low-skilled counterfeits
<ul>
<li>You need to be able to demonstrate raw skills, not just list your certs</li>
<li>Have a body of work available for review on GitHub, your own site, etc.</li>
<li>Internships are a nice touch, but they cut both ways
<ul>
<li>You interned with unnamed-big-4-biz-consulting firm? Don't drag that culture in here. I fear for what you learned.</li>
</ul><br/>
</li>
<li>Can't talk about where you interned because it was a non-DOD three-letter agency? Communicate that point to me in your way. If that is the truth, I'll trace you back and verify.</li>
</ul><br/>
</li>
<li>Always be client-facing
<ul>
<li>I have seen many recruits passed over for poor hygiene, arrogant treatment of interviewers, disclosure of illegal activity, and just generally obnoxious behavior
<ul>
<li>You couldn't act like this on a client site and not get sent home; don't do it on the interview</li>
<li>Yes, you are talented...there's always someone cooler than you</li>
</ul><br/>
</li>
</ul><br/>
</li>
<li>Interview your interviewers
<ul>
<li>You should have a standing list of questions for interviewers
<ul>
<li>Why do you stay with them?</li>
<li>What is the intended growth path? Organic? IPO? Channel?</li>
<li>Is there any merger/acquisition activity going on? Planned? Intended impact?</li>
<li>Is there any rebranding activity going on? Planned? Intended impact?</li>
<li>What conditions are driving this open role? Turnover? Internal restructuring? Organizational growth?</li>
<li>Will I be supported in my security research? How?</li>
<li>Does your company have a defined mentoring path? Why not?</li>
<li>How does the company support continuing infosec education?</li>
</ul><br/>
</li>
</ul><br/>
</li>
<li>Meet your team
<ul>
<li>Watch the team interaction closely</li>
<li>Can you see cohesion? Are they supportive or adversarial? Are they authentically happy with their jobs?</li>
</ul><br/>
</li>
<li>Understand the org chart you are stepping into
<ul>
<li>To whom does security answer? CXX? IT Director? General Counsel?
<ul>
<li>Understanding this will help mitigate surprises later</li>
</ul><br/>
</li>
</ul><br/>
</li>
<li>Understand the company culture
<ul>
<li>Big corp? Big corp problems.</li>
<li>Boutique? Founder problems.</li>
<li>Is there a "treehouse" mentality among the senior employees?</li>
</ul><br/>
</li>
<li>Never forget who you are
<ul>
<li>I know you want a job, but don't take a job that is sure to kill you slowly from the inside
<ul>
<li>Like doing offensive security? Don't start in the SOC.</li>
</ul><br/>
</li>
<li>Did you walk away from the interview(s) thinking that this company understands the care &amp; feeding of hackers?</li>
<li>If you can already see the point at which you will outgrow the company, is it the right place to start?
<ul>
<li>Maybe! If you have a goal of entrepreneurship, or of working for a specific team, this first step just needs to support that eventual goal. This may be detected by an astute interviewer, though.</li>
</ul><br/>
</li>
</ul><br/>
</li>
</ul><br/>
<p><strong>Resume tips</strong></p>
<ul>
<li>One page.
<ul>
<li>My dad started at the bottom, and worked up to EVP of a Fortune 50 corp. One page.</li>
</ul><br/>
</li>
<li>Focus on your work experiences and extracurricular infosec workrelevant</li>
<li>I'd rather read about 0days and CVEs than certs</li>
<li>I want to know about your community involvement
<ul>
<li>2600, local DCs, TOOOL, OWASP, etc.</li>
<li>Presentations at cons matter to me, especially if I can watch you deliver information to an audience
<ul>
<li>Like a free audition, and believe me I watch every one people link in resumes</li>
</ul><br/>
</li>
</ul><br/>
</li>
<li>I don't care about your GPA, fraternity/sorority, who we know in common, what sports you enjoy, or what you look like. At all.
<ul>
<li>Seriously, don't add a photo.</li>
</ul><br/>
</li>
</ul><br/>
<p><strong>General tips</strong></p>
<ul>
<li>Code in several languages.
<ul>
<li>Despite semantic differences, you should have a pretty good working knowledge of the most widespread VMs, coding languages, and compilers</li>
</ul><br/>
</li>
<li>Web apps are your paycheck
<ul>
<li>Knowing the OWASP Top 10 is like knowing your middle name...not impressive in and of itself, but if you don't know them, there's something wrong.</li>
<li>Many composite "red team" projects will involve some Web app hacking, and even the most specialized consultancies will agree to a Web app assessment for an established client</li>
</ul><br/>
</li>
<li>Think holistically, and make yourself more valuable
<ul>
<li>If you can't write a report, of what value are your assessment activities?</li>
<li>Seem always to have interpersonal conflict? Time to read up on Empathy and EQ. Be the go-to on your squad.</li>
<li>Get comfortable with an audience. Toastmasters is there for you.</li>
</ul><br/>
</li>
<li>Learn the value of "the Halloween Mask" as Henry Rollins called it
<ul>
<li>Sure, you're a young security professional. We all expect eccentricity from you. We're all also trying to make money and be taken seriously
<ul>
<li>Don't forget: in boardrooms of white-haired old men across the nation, we're still the same guys who lost them millions of dollars on ERPs and useless Y2K preparations</li>
<li>I'm not kidding about this.</li>
</ul><br/>
</li>
<li>Don't wield your difference like a blunt object. A little bit goes a long way when you're also scaring the hell out of everyone with pen test reports.</li>
<li>My life is far more complex and wacky than my coworkers know, and I talk a lot. I just know how much to let through the mask</li>
</ul><br/>
</li>
</ul><br/>
<p><strong>Getting Into Infosec:</strong></p>
<ul>
<li>Follow Me on Twitter: <a href="https://twitter.com/coffeewithayman">https://twitter.com/coffeewithayman</a></li>
<li>Subscribe To YouTube: <a href="https://www.youtube.com/channel/UCg6gV_gdfc188HZdN8LUx4A">https://www.youtube.com/channel/UCg6gV_gdfc188HZdN8LUx4A</a></li>
<li>Checkout My Book: <a href="https://amzn.to/2HP2i25">https://amzn.to/2HP2i25</a></li>
<li>Sign up for updates and commentary: <a href="https://mailchi.mp/467573a314e5/gettingintoinfosec">https://mailchi.mp/467573a314e5/gettingintoinfosec</a></li>
<li>Website: <a href="https://gettingintoinfosec.com/">https://gettingintoinfosec.com</a></li>
</ul><br/><p>See <a href="https://omnystudio.com/listener">omnystudio.com/listener</a> for privacy information.</p><p>Mentioned in this episode:</p><p><a href="https://getting-into-infosec.captivate.fm/stayintouch">Stay In Touch</a></p>]]></content:encoded><link><![CDATA[https://getting-into-infosec.captivate.fm/episode/nick-jeswald-confessions-of-a-cybersecurity-recruiter-part-1]]></link><guid isPermaLink="false">9a02a2db-ffbd-4c91-80dc-9aca5b687099</guid><itunes:image href="https://artwork.captivate.fm/5927fccb-6bea-4648-b24f-3b573cc34658/image.jpg"/><dc:creator><![CDATA[Ayman Elsawah (@coffeewithayman)]]></dc:creator><pubDate>Fri, 25 Oct 2019 07:27:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/3e7f0871-fcb3-4834-b372-a88bec1bd08f/audio.mp3" length="35085503" type="audio/mpeg"/><itunes:duration>36:33</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>26</itunes:episode><podcast:episode>26</podcast:episode><itunes:summary>Part 1 of 2 - Nick Jeswald has been an external and internal recruiter in security. He shares with us what he looks for in a candidate, common mistakes made by candidates, and the nuances of hackers he&apos;s learned over the years.</itunes:summary><itunes:author>Ayman Elsawah (@coffeewithayman)</itunes:author></item><item><title>September 2019 Update</title><itunes:title>September 2019 Update</itunes:title><description><![CDATA[<p>Summer was crazy. My day job was keeping me super busy, and I've been really mentally occupied lately dealing with kids, family, and school. I miss producing shows and will be getting back into it. Have some really good shows queued up! I've still active on Twitter when possible, so we can stay in touch there in between shows.</p>
<p>Oh, and by the way, it's been a year since I started podcasting! Pretty cool. So many things I want to do with the show, like animating my spoof ads and transcribing the shows.</p>
<p>Anyway, just wanted to update you and let you know I didn't forget about you. I can't wait to release some of these amazing shows.</p>
<p>As we depart, here is a draft of a spoof ad I put together real quick. It talks about my love of the word "cyber."</p>
<p>See you next time.</p>
<p><strong>Getting Into Infosec:</strong></p>
<ul>
<li>Follow Me on Twitter: <a href="https://twitter.com/coffeewithayman">https://twitter.com/coffeewithayman</a></li>
<li>Sign up for updates and commentary: <a href="https://mailchi.mp/467573a314e5/gettingintoinfosec">https://mailchi.mp/467573a314e5/gettingintoinfosec</a></li>
<li>Subscribe To YouTube: <a href="https://www.youtube.com/channel/UCg6gV_gdfc188HZdN8LUx4A">https://www.youtube.com/channel/UCg6gV_gdfc188HZdN8LUx4A</a></li>
<li>Checkout My Book - Breaking IN: A Practical Guide To Starting A Career In Infosec - <a href="https://amzn.to/2HP2i25">https://amzn.to/2HP2i25</a></li>
<li>Website: <a href="https://gettingintoinfosec.com/">https://gettingintoinfosec.com</a></li>
</ul><br/><p>See <a href="https://omnystudio.com/listener">omnystudio.com/listener</a> for privacy information.</p><p>Mentioned in this episode:</p><p><a href="https://getting-into-infosec.captivate.fm/stayintouch">Stay In Touch</a></p>]]></description><content:encoded><![CDATA[<p>Summer was crazy. My day job was keeping me super busy, and I've been really mentally occupied lately dealing with kids, family, and school. I miss producing shows and will be getting back into it. Have some really good shows queued up! I've still active on Twitter when possible, so we can stay in touch there in between shows.</p>
<p>Oh, and by the way, it's been a year since I started podcasting! Pretty cool. So many things I want to do with the show, like animating my spoof ads and transcribing the shows.</p>
<p>Anyway, just wanted to update you and let you know I didn't forget about you. I can't wait to release some of these amazing shows.</p>
<p>As we depart, here is a draft of a spoof ad I put together real quick. It talks about my love of the word "cyber."</p>
<p>See you next time.</p>
<p><strong>Getting Into Infosec:</strong></p>
<ul>
<li>Follow Me on Twitter: <a href="https://twitter.com/coffeewithayman">https://twitter.com/coffeewithayman</a></li>
<li>Sign up for updates and commentary: <a href="https://mailchi.mp/467573a314e5/gettingintoinfosec">https://mailchi.mp/467573a314e5/gettingintoinfosec</a></li>
<li>Subscribe To YouTube: <a href="https://www.youtube.com/channel/UCg6gV_gdfc188HZdN8LUx4A">https://www.youtube.com/channel/UCg6gV_gdfc188HZdN8LUx4A</a></li>
<li>Checkout My Book - Breaking IN: A Practical Guide To Starting A Career In Infosec - <a href="https://amzn.to/2HP2i25">https://amzn.to/2HP2i25</a></li>
<li>Website: <a href="https://gettingintoinfosec.com/">https://gettingintoinfosec.com</a></li>
</ul><br/><p>See <a href="https://omnystudio.com/listener">omnystudio.com/listener</a> for privacy information.</p><p>Mentioned in this episode:</p><p><a href="https://getting-into-infosec.captivate.fm/stayintouch">Stay In Touch</a></p>]]></content:encoded><link><![CDATA[https://getting-into-infosec.captivate.fm/episode/september-2019-update]]></link><guid isPermaLink="false">19425f8a-ad16-4f03-9fc7-83ca3b5ddada</guid><itunes:image href="https://artwork.captivate.fm/1afd93d4-5dfa-4238-a210-0c492982a9f9/image.jpg"/><dc:creator><![CDATA[Ayman Elsawah (@coffeewithayman)]]></dc:creator><pubDate>Mon, 23 Sep 2019 11:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/2c94eb38-23d9-400d-85e8-56b25e67301b/audio.mp3" length="2460819" type="audio/mpeg"/><itunes:duration>02:34</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>bonus</itunes:episodeType><itunes:summary>Hey you! I know it&apos;s been awhile, but just wanted to drop you a message letting you know I&apos;m still alive!</itunes:summary><itunes:author>Ayman Elsawah (@coffeewithayman)</itunes:author></item><item><title>Fareedah Shaheed - From Tech Curious to Information Security</title><itunes:title>Fareedah Shaheed - From Tech Curious to Information Security</itunes:title><description><![CDATA[<p>Fareedah, a lifelong learner, was always interested in technology and grew up reading her father's Cisco books. His influence led her to the field of information security, where she stepped up and is always tackling new challenges.</p>
<p><strong>BIO</strong></p>
<p>Fareedah Shaheed was born in Maryland, but spent most of her childhood outside of the US. She returned to the States in 2013 and attended the Community College of Baltimore County (CCBC), where she majored in cybersecurity.</p>
<p>Her experiences with different cultures and the tech field led her to combine her interest in psychology with cybersecurity, and thus, her passion for security awareness was born.</p>
<p>In 2018, she founded Sekuva with the mission to educate and support small business owners and families with understanding how to secure their sensitive information.</p>
<p>She currently works as a Security Control Analyst at a financial firm in Maryland.</p>
<p><strong>Notes:</strong></p>
<ul>
<li>Currently works with Security Awareness and Threat Intelligence</li>
<li>Must break down concepts for both executives and associates</li>
<li>Saw that there was a lack of cybersecurity awareness for "regular" people, especially with parents</li>
<li>Got thrown into leading "lunch &amp; learn" events and experienced imposter syndrome due to her lack of her experience</li>
<li>Her lack of experience became a benefit to the audience as they were able to relate!</li>
<li>Father was in tech. Changed her major in college based on his advice</li>
<li>Wanted to teach, but didn't want to be a teacher</li>
<li>Has read 2000 books since childhood</li>
<li>Fareedah had really good role models growing up</li>
</ul><br/>
<p><strong>Quotes:</strong></p>
<ul>
<li>"I vowed never to have anything to do with math whatsoever."</li>
<li>"I was a broker, I did an internship, I did teaching... and through all of that, I realized I didn't really want anything but tech."</li>
<li>"Whatever your parents' field is, that kind of is in the back of your head, whether it's a yes or no."</li>
<li>"Let me do it. Let me try this out."</li>
<li>"Cybersecurity is new. It's upcoming. I really believe that your skills would be good for cyber. There's not a lot of women there. Especially not a lot Muslim women there, who look like you."</li>
<li>"I remember just lying awake at night just thinking about how does WiFi work."</li>
<li>" Instead of guards, we have guides." [21:12]</li>
<li>"You have to do it afraid; you can't wait for the perfect moment." [25:35]</li>
</ul><br/>
<p><strong>Links:</strong></p>
<ul>
<li>Fareedah on Twitter: <a href="https://twitter.com/cyberfareedah">https://twitter.com/cyberfareedah</a></li>
<li>Fareedah's Company- Sekuva: <a href="https://sekuva.mykajabi.com/">https://sekuva.mykajabi.com/</a></li>
<li>Year Up: <a href="https://www.yearup.org/">https://www.yearup.org/</a></li>
</ul><br/>
<p><strong>Getting Into Infosec:</strong></p>
<ul>
<li>Follow Me on Twitter: <a href="https://twitter.com/coffeewithayman">https://twitter.com/coffeewithayman</a></li>
<li>Subscribe To YouTube: <a href="https://www.youtube.com/channel/UCg6gV_gdfc188HZdN8LUx4A">https://www.youtube.com/channel/UCg6gV_gdfc188HZdN8LUx4A</a></li>
<li>Checkout My Book: <a href="https://amzn.to/2HP2i25">https://amzn.to/2HP2i25</a></li>
<li>Sign up for updates and commentary: <a href="https://mailchi.mp/467573a314e5/gettingintoinfosec">https://mailchi.mp/467573a314e5/gettingintoinfosec</a></li>
<li>Website: <a href="https://gettingintoinfosec.com">https://gettingintoinfosec.com</a></li>
</ul><br/><p>See <a href="https://omnystudio.com/listener">omnystudio.com/listener</a> for privacy information.</p><p>Mentioned in this episode:</p><p><a href="https://getting-into-infosec.captivate.fm/stayintouch">Stay In Touch</a></p>]]></description><content:encoded><![CDATA[<p>Fareedah, a lifelong learner, was always interested in technology and grew up reading her father's Cisco books. His influence led her to the field of information security, where she stepped up and is always tackling new challenges.</p>
<p><strong>BIO</strong></p>
<p>Fareedah Shaheed was born in Maryland, but spent most of her childhood outside of the US. She returned to the States in 2013 and attended the Community College of Baltimore County (CCBC), where she majored in cybersecurity.</p>
<p>Her experiences with different cultures and the tech field led her to combine her interest in psychology with cybersecurity, and thus, her passion for security awareness was born.</p>
<p>In 2018, she founded Sekuva with the mission to educate and support small business owners and families with understanding how to secure their sensitive information.</p>
<p>She currently works as a Security Control Analyst at a financial firm in Maryland.</p>
<p><strong>Notes:</strong></p>
<ul>
<li>Currently works with Security Awareness and Threat Intelligence</li>
<li>Must break down concepts for both executives and associates</li>
<li>Saw that there was a lack of cybersecurity awareness for "regular" people, especially with parents</li>
<li>Got thrown into leading "lunch &amp; learn" events and experienced imposter syndrome due to her lack of her experience</li>
<li>Her lack of experience became a benefit to the audience as they were able to relate!</li>
<li>Father was in tech. Changed her major in college based on his advice</li>
<li>Wanted to teach, but didn't want to be a teacher</li>
<li>Has read 2000 books since childhood</li>
<li>Fareedah had really good role models growing up</li>
</ul><br/>
<p><strong>Quotes:</strong></p>
<ul>
<li>"I vowed never to have anything to do with math whatsoever."</li>
<li>"I was a broker, I did an internship, I did teaching... and through all of that, I realized I didn't really want anything but tech."</li>
<li>"Whatever your parents' field is, that kind of is in the back of your head, whether it's a yes or no."</li>
<li>"Let me do it. Let me try this out."</li>
<li>"Cybersecurity is new. It's upcoming. I really believe that your skills would be good for cyber. There's not a lot of women there. Especially not a lot Muslim women there, who look like you."</li>
<li>"I remember just lying awake at night just thinking about how does WiFi work."</li>
<li>" Instead of guards, we have guides." [21:12]</li>
<li>"You have to do it afraid; you can't wait for the perfect moment." [25:35]</li>
</ul><br/>
<p><strong>Links:</strong></p>
<ul>
<li>Fareedah on Twitter: <a href="https://twitter.com/cyberfareedah">https://twitter.com/cyberfareedah</a></li>
<li>Fareedah's Company- Sekuva: <a href="https://sekuva.mykajabi.com/">https://sekuva.mykajabi.com/</a></li>
<li>Year Up: <a href="https://www.yearup.org/">https://www.yearup.org/</a></li>
</ul><br/>
<p><strong>Getting Into Infosec:</strong></p>
<ul>
<li>Follow Me on Twitter: <a href="https://twitter.com/coffeewithayman">https://twitter.com/coffeewithayman</a></li>
<li>Subscribe To YouTube: <a href="https://www.youtube.com/channel/UCg6gV_gdfc188HZdN8LUx4A">https://www.youtube.com/channel/UCg6gV_gdfc188HZdN8LUx4A</a></li>
<li>Checkout My Book: <a href="https://amzn.to/2HP2i25">https://amzn.to/2HP2i25</a></li>
<li>Sign up for updates and commentary: <a href="https://mailchi.mp/467573a314e5/gettingintoinfosec">https://mailchi.mp/467573a314e5/gettingintoinfosec</a></li>
<li>Website: <a href="https://gettingintoinfosec.com">https://gettingintoinfosec.com</a></li>
</ul><br/><p>See <a href="https://omnystudio.com/listener">omnystudio.com/listener</a> for privacy information.</p><p>Mentioned in this episode:</p><p><a href="https://getting-into-infosec.captivate.fm/stayintouch">Stay In Touch</a></p>]]></content:encoded><link><![CDATA[https://getting-into-infosec.captivate.fm/episode/fareedah-shaheed-from-tech-curious-to-information-security]]></link><guid isPermaLink="false">40e237f0-7c74-40fa-8f40-9a5808d70e43</guid><itunes:image href="https://artwork.captivate.fm/cc20cadc-9ae2-4b9c-9543-531cadfe6e99/image.jpg"/><dc:creator><![CDATA[Ayman Elsawah (@coffeewithayman)]]></dc:creator><pubDate>Wed, 31 Jul 2019 06:52:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/958ea7b7-a9f0-43b9-bdd7-e399f88c438c/audio.mp3" length="32075775" type="audio/mpeg"/><itunes:duration>33:25</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>25</itunes:episode><podcast:episode>25</podcast:episode><itunes:summary>Fareedah, a lifelong learner, was always interested in technology and grew up reading her father&apos;s Cisco books. His influence led her to the field of information security where she stepped up and is always tackling new challenges.</itunes:summary><itunes:author>Ayman Elsawah (@coffeewithayman)</itunes:author></item><item><title>BONUS - Updates, Defcon, More</title><itunes:title>BONUS - Updates, Defcon, More</itunes:title><description><![CDATA[<p>Hey, everyone!</p>
<p>It's been a while, I know. Life has been busy. Lots of transitions, so schedule has taken time to get used to.</p>
<p><strong>Links</strong></p>
<ul>
<li>Security Sandbox Podcast: <a href="https://podcasts.apple.com/us/podcast/hacker-culture-fm/id1453203447">https://podcasts.apple.com/us/podcast/hacker-culture-fm/id1453203447</a></li>
<li>Sean Sun: <a href="https://twitter.com/seanqsun">https://twitter.com/seanqsun</a></li>
<li>Hacker Culture FM: <a href="https://www.hackerculture.fm/">https://www.hackerculture.fm/</a></li>
<li>Defcon Sticker Swap: <a href="https://twitter.com/dcstickerswap">https://twitter.com/dcstickerswap</a></li>
<li>Outro Music: <a href="https://soundcloud.com/southlondonhifi">https://soundcloud.com/southlondonhifi</a></li>
</ul><br/>
<p><strong>Getting Into Infosec:</strong></p>
<ul>
<li>
<p>Follow Me on Twitter: <a href="https://twitter.com/coffeewithayman">https://twitter.com/coffeewithayman</a></p>
</li>
<li>
<p>Subscribe To YouTube: <a href="https://www.youtube.com/channel/UCg6gV_gdfc188HZdN8LUx4A">https://www.youtube.com/channel/UCg6gV_gdfc188HZdN8LUx4A</a></p>
</li>
<li>
<p>Checkout My Book: <a href="https://amzn.to/2HP2i25">https://amzn.to/2HP2i25</a></p>
</li>
<li>
<p>Sign up for updates and commentary: <a href="https://mailchi.mp/467573a314e5/gettingintoinfosec">https://mailchi.mp/467573a314e5/gettingintoinfosec</a></p>
</li>
<li>
<p>Website: <a href="https://gettingintoinfosec.com">https://gettingintoinfosec.com</a></p>
</li>
</ul><br/><p>See <a href="https://omnystudio.com/listener">omnystudio.com/listener</a> for privacy information.</p><p>Mentioned in this episode:</p><p><a href="https://getting-into-infosec.captivate.fm/stayintouch">Stay In Touch</a></p>]]></description><content:encoded><![CDATA[<p>Hey, everyone!</p>
<p>It's been a while, I know. Life has been busy. Lots of transitions, so schedule has taken time to get used to.</p>
<p><strong>Links</strong></p>
<ul>
<li>Security Sandbox Podcast: <a href="https://podcasts.apple.com/us/podcast/hacker-culture-fm/id1453203447">https://podcasts.apple.com/us/podcast/hacker-culture-fm/id1453203447</a></li>
<li>Sean Sun: <a href="https://twitter.com/seanqsun">https://twitter.com/seanqsun</a></li>
<li>Hacker Culture FM: <a href="https://www.hackerculture.fm/">https://www.hackerculture.fm/</a></li>
<li>Defcon Sticker Swap: <a href="https://twitter.com/dcstickerswap">https://twitter.com/dcstickerswap</a></li>
<li>Outro Music: <a href="https://soundcloud.com/southlondonhifi">https://soundcloud.com/southlondonhifi</a></li>
</ul><br/>
<p><strong>Getting Into Infosec:</strong></p>
<ul>
<li>
<p>Follow Me on Twitter: <a href="https://twitter.com/coffeewithayman">https://twitter.com/coffeewithayman</a></p>
</li>
<li>
<p>Subscribe To YouTube: <a href="https://www.youtube.com/channel/UCg6gV_gdfc188HZdN8LUx4A">https://www.youtube.com/channel/UCg6gV_gdfc188HZdN8LUx4A</a></p>
</li>
<li>
<p>Checkout My Book: <a href="https://amzn.to/2HP2i25">https://amzn.to/2HP2i25</a></p>
</li>
<li>
<p>Sign up for updates and commentary: <a href="https://mailchi.mp/467573a314e5/gettingintoinfosec">https://mailchi.mp/467573a314e5/gettingintoinfosec</a></p>
</li>
<li>
<p>Website: <a href="https://gettingintoinfosec.com">https://gettingintoinfosec.com</a></p>
</li>
</ul><br/><p>See <a href="https://omnystudio.com/listener">omnystudio.com/listener</a> for privacy information.</p><p>Mentioned in this episode:</p><p><a href="https://getting-into-infosec.captivate.fm/stayintouch">Stay In Touch</a></p>]]></content:encoded><link><![CDATA[https://getting-into-infosec.captivate.fm/episode/bonus-updates-defcon-more]]></link><guid isPermaLink="false">0a4aae0c-5bd4-4e78-8d96-8f008bfaef94</guid><itunes:image href="https://artwork.captivate.fm/f0cb2534-4666-4278-80a8-6a34f56963c8/image.jpg"/><dc:creator><![CDATA[Ayman Elsawah (@coffeewithayman)]]></dc:creator><pubDate>Fri, 26 Jul 2019 05:30:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/595312a6-f4ba-453b-a3e5-07b91abe4f40/audio.mp3" length="4497124" type="audio/mpeg"/><itunes:duration>04:41</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>bonus</itunes:episodeType><itunes:summary>Hey everyone! It&apos;s been awhile, I know! Life has been busy. Lots of transitions, so schedule has taken time to get used to.</itunes:summary><itunes:author>Ayman Elsawah (@coffeewithayman)</itunes:author></item><item><title>Keya Horiuchi -  From Teacher, Filmmaker, and Website Design to Security Engineer!</title><itunes:title>Keya Horiuchi -  From Teacher, Filmmaker, and Website Design to Security Engineer!</itunes:title><description><![CDATA[<p>Keya was a public school teacher who stood out from the crowd. She loves problem-solving and challenging environments. Keya was also a filmmaker and web designer. She's currently a detection security engineer who gets knee-deep in malware on a daily basis.</p>
<p><strong>Notes:</strong></p>
<ul>
<li>Knew she didn't want to be a teacher her whole life</li>
<li>Was the only one in the rational thinking group at her school</li>
<li>Enjoys rational thinking and the problem-solving process</li>
<li>Prototyped a mock medical device with a Raspberry Pi and won a national competition!</li>
</ul><br/>
<p><strong>Quotes:</strong></p>
<ul>
<li>"Easy to get into what you're comfortable with... and I didn't want to have a job like that."</li>
<li>"It was something that I enjoyed, but I definitely feel more at home with the cohort that I work with currently and with what I do."</li>
<li>"For me, it was an amazing process because I hadn't ever SSH&rsquo;d into a device and I had to figure out how to get like ports scan."</li>
<li>"I read so much documentation on all the little things that we connected to it. I watched a bunch of YouTube videos. I looked at a lot of GitHub accounts trying to figure out like I've got to make this move." [14:24]</li>
<li>"It was incredibly challenging. A lot of times I was trying to figure [things] out... sometimes the information that you get from the client is essentially just a hint of what's going on in the network." [17:07]</li>
<li>" You just have to be creative and keep going at it until you can do what needs to be done." [18:08]</li>
<li>"Yeah, it's amazing. Especially coming from public school teaching, where I had seen almost physical fights altercations happen over, like, reams of paper because there's just not that much allocated towards schools to where snacks are brought in. Like, it's a very different environment&hellip;" [21:22]</li>
<li>"You did great on the test, but I want to watch you take the test." [23:06]</li>
</ul><br/>
<p><strong>Links:</strong></p>
<ul>
<li>Edx: <a href="https://www.edx.org/">https://www.edx.org/</a></li>
<li>NSF Project: <a href="https://nsf2015.fosslounge.org/">https://nsf2015.fosslounge.org/</a></li>
<li>Intro Music: Cascadia by Trash80 - <a href="https://trash80.com/#/content/133/weeklybeats-2012-week5">https://trash80.com/#/content/133/weeklybeats-2012-week5</a> (Released under Creative Commons)</li>
<li>Outro: Cosmetic Cosmos by Verified Picasso <a href="https://www.youtube.com/channel/UCqDmyXPJdrZjwUdWLyhyQRA">https://www.youtube.com/channel/UCqDmyXPJdrZjwUdWLyhyQRA</a></li>
</ul><br/>
<p><strong>Getting Into Infosec:</strong></p>
<ul>
<li>Website, Show Notes, Transcripts: <a href="https://gettingintoinfosec.com">https://gettingintoinfosec.com</a></li>
<li>Follow Me on Twitter: <a href="https://twitter.com/coffeewithayman">https://twitter.com/coffeewithayman</a></li>
<li>Subscribe To YouTube: <a href="https://www.youtube.com/channel/UCg6gV_gdfc188HZdN8LUx4A">https://www.youtube.com/channel/UCg6gV_gdfc188HZdN8LUx4A</a></li>
<li>Checkout My Book: <a href="https://amzn.to/2HP2i25">https://amzn.to/2HP2i25</a></li>
</ul><br/><p>See <a href="https://omnystudio.com/listener">omnystudio.com/listener</a> for privacy information.</p><p>Mentioned in this episode:</p><p><a href="https://getting-into-infosec.captivate.fm/stayintouch">Stay In Touch</a></p>]]></description><content:encoded><![CDATA[<p>Keya was a public school teacher who stood out from the crowd. She loves problem-solving and challenging environments. Keya was also a filmmaker and web designer. She's currently a detection security engineer who gets knee-deep in malware on a daily basis.</p>
<p><strong>Notes:</strong></p>
<ul>
<li>Knew she didn't want to be a teacher her whole life</li>
<li>Was the only one in the rational thinking group at her school</li>
<li>Enjoys rational thinking and the problem-solving process</li>
<li>Prototyped a mock medical device with a Raspberry Pi and won a national competition!</li>
</ul><br/>
<p><strong>Quotes:</strong></p>
<ul>
<li>"Easy to get into what you're comfortable with... and I didn't want to have a job like that."</li>
<li>"It was something that I enjoyed, but I definitely feel more at home with the cohort that I work with currently and with what I do."</li>
<li>"For me, it was an amazing process because I hadn't ever SSH&rsquo;d into a device and I had to figure out how to get like ports scan."</li>
<li>"I read so much documentation on all the little things that we connected to it. I watched a bunch of YouTube videos. I looked at a lot of GitHub accounts trying to figure out like I've got to make this move." [14:24]</li>
<li>"It was incredibly challenging. A lot of times I was trying to figure [things] out... sometimes the information that you get from the client is essentially just a hint of what's going on in the network." [17:07]</li>
<li>" You just have to be creative and keep going at it until you can do what needs to be done." [18:08]</li>
<li>"Yeah, it's amazing. Especially coming from public school teaching, where I had seen almost physical fights altercations happen over, like, reams of paper because there's just not that much allocated towards schools to where snacks are brought in. Like, it's a very different environment&hellip;" [21:22]</li>
<li>"You did great on the test, but I want to watch you take the test." [23:06]</li>
</ul><br/>
<p><strong>Links:</strong></p>
<ul>
<li>Edx: <a href="https://www.edx.org/">https://www.edx.org/</a></li>
<li>NSF Project: <a href="https://nsf2015.fosslounge.org/">https://nsf2015.fosslounge.org/</a></li>
<li>Intro Music: Cascadia by Trash80 - <a href="https://trash80.com/#/content/133/weeklybeats-2012-week5">https://trash80.com/#/content/133/weeklybeats-2012-week5</a> (Released under Creative Commons)</li>
<li>Outro: Cosmetic Cosmos by Verified Picasso <a href="https://www.youtube.com/channel/UCqDmyXPJdrZjwUdWLyhyQRA">https://www.youtube.com/channel/UCqDmyXPJdrZjwUdWLyhyQRA</a></li>
</ul><br/>
<p><strong>Getting Into Infosec:</strong></p>
<ul>
<li>Website, Show Notes, Transcripts: <a href="https://gettingintoinfosec.com">https://gettingintoinfosec.com</a></li>
<li>Follow Me on Twitter: <a href="https://twitter.com/coffeewithayman">https://twitter.com/coffeewithayman</a></li>
<li>Subscribe To YouTube: <a href="https://www.youtube.com/channel/UCg6gV_gdfc188HZdN8LUx4A">https://www.youtube.com/channel/UCg6gV_gdfc188HZdN8LUx4A</a></li>
<li>Checkout My Book: <a href="https://amzn.to/2HP2i25">https://amzn.to/2HP2i25</a></li>
</ul><br/><p>See <a href="https://omnystudio.com/listener">omnystudio.com/listener</a> for privacy information.</p><p>Mentioned in this episode:</p><p><a href="https://getting-into-infosec.captivate.fm/stayintouch">Stay In Touch</a></p>]]></content:encoded><link><![CDATA[https://getting-into-infosec.captivate.fm/episode/keya-horiuchi-from-teacher-filmmaker-and-website-design-to-security-engineer]]></link><guid isPermaLink="false">ab87383b-587d-4163-999e-7f0b85cb16c1</guid><itunes:image href="https://artwork.captivate.fm/3b472ea5-8c78-4506-a0f3-ed904bf7afee/image.jpg"/><dc:creator><![CDATA[Ayman Elsawah (@coffeewithayman)]]></dc:creator><pubDate>Sat, 15 Jun 2019 02:12:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/a8d33865-dd0a-4204-9080-8a3a3dce4d07/audio.mp3" length="28656891" type="audio/mpeg"/><itunes:duration>29:51</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>24</itunes:episode><podcast:episode>24</podcast:episode><itunes:summary>Keya was a public school teacher who stood out of crowd. She loves problem solving and challenging environments. Keya was also a filmmaker and web designer. She&apos;s currently a detection security engineer who get knee deep in malware on a daily basis.</itunes:summary><itunes:author>Ayman Elsawah (@coffeewithayman)</itunes:author></item><item><title>BONUS - Audiobook Sample!</title><itunes:title>BONUS - Audiobook Sample!</itunes:title><description><![CDATA[<p>Listen to the retail audio sample of my book: Breaking IN - A Practical Guide to Starting a Career In Information Security.</p>
<p>Kati Fredlund narrates the book. She did an amazing job!</p>
<p>You can read a sample or purchase the whole book here:<a href="https://t.co/DDXxfVwpD7"> https://t.co/DDXxfVwpD7</a></p>
<p>Full Audiobook to be released soon!</p><p>See <a href="https://omnystudio.com/listener">omnystudio.com/listener</a> for privacy information.</p><p>Mentioned in this episode:</p><p><a href="https://getting-into-infosec.captivate.fm/stayintouch">Stay In Touch</a></p>]]></description><content:encoded><![CDATA[<p>Listen to the retail audio sample of my book: Breaking IN - A Practical Guide to Starting a Career In Information Security.</p>
<p>Kati Fredlund narrates the book. She did an amazing job!</p>
<p>You can read a sample or purchase the whole book here:<a href="https://t.co/DDXxfVwpD7"> https://t.co/DDXxfVwpD7</a></p>
<p>Full Audiobook to be released soon!</p><p>See <a href="https://omnystudio.com/listener">omnystudio.com/listener</a> for privacy information.</p><p>Mentioned in this episode:</p><p><a href="https://getting-into-infosec.captivate.fm/stayintouch">Stay In Touch</a></p>]]></content:encoded><link><![CDATA[https://getting-into-infosec.captivate.fm/episode/bonus-audiobook-sample]]></link><guid isPermaLink="false">b2489b42-ccb0-44dc-b6fb-0f8406f3b8db</guid><itunes:image href="https://artwork.captivate.fm/31ce7d81-dcfa-446f-bb67-2249c6fd4974/image.jpg"/><dc:creator><![CDATA[Ayman Elsawah (@coffeewithayman)]]></dc:creator><pubDate>Tue, 04 Jun 2019 22:20:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/515dd7fc-c992-48fe-bc14-c5c139c7f1e0/audio.mp3" length="4162335" type="audio/mpeg"/><itunes:duration>04:20</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>bonus</itunes:episodeType><itunes:summary>Preview the retail audio sample of my book: Breaking IN - A Practical Guide to Starting a Career In Information Security</itunes:summary><itunes:author>Ayman Elsawah (@coffeewithayman)</itunes:author></item><item><title>Hossam Mohamed - Young Hacker to &quot;Not A Security Researcher&quot;</title><itunes:title>Hossam Mohamed - Young Hacker to &quot;Not A Security Researcher&quot;</itunes:title><description><![CDATA[<p>A 19-year-old "not a security researcher" facing limitations because of his age and not having the right "prerequisites," Hossam has had to pave his own path. He also dreams in code and is one of the youngest OSCEs in the world!</p>
<p><strong>BIO</strong></p>
<p>Hossam Mohamed is one of the youngest OSCE in the world and currently working in the cybersecurity domain for a financial company in Istanbul. His area of interest includes exploit development, offensive security, secure web development, and malware analysis. He is a big Python lover.</p>
<p><strong>Notes</strong></p>
<ul>
<li>On the organizing team of BSides Istanbul</li>
<li>His best friend is a computer</li>
<li>Just finished high school last year!</li>
<li>Was doing freelance web design and security projects for clients</li>
<li>Taught himself assembly</li>
<li>Developing offensive security labs</li>
<li>Hacked his way to getting a job :)</li>
</ul><br/>
<p><strong>Quotes:</strong></p>
<ul>
<li>"Because I love [to] code."</li>
<li>"I wanted to understand how these games work." [5:56]</li>
<li>"I developed a project for my school. They liked it, but no one cared actually."</li>
<li>"No one in infosec doesn't play a little bit (hacking)." [8:04]</li>
<li>"Technical interview was great... didn't work because of my age and my education. I was only 18." [10:22]</li>
<li>"Do you ever dream in code?" "Actually... how did you know that?" [12:35]</li>
<li>"People think when it's about assembly and reverse engineering, omg it's untouchable... No, I'm telling you there is [a] much more lower level than that."</li>
<li>"I feel bad when I get sick because I don't go to work... I don't (get to) open my laptop and... code."</li>
<li>"When I'm far from my computer for two or three days... [I get] depressed."</li>
<li>"You can make it part of your day." [22:52]</li>
<li>"I wanted to send them the new domain controller password with the report. " [25:23]</li>
</ul><br/>
<p><strong>Links</strong></p>
<ul>
<li>Hosasm on Twitter: <a href="https://twitter.com/wazehell">https://twitter.com/wazehell</a></li>
<li>Hossam's Website: <a href="https://wazehell.io/">https://wazehell.io/</a></li>
<li>BSides Istanbul: <a href="https://bsidesistanbul.com/">https://bsidesistanbul.com/</a></li>
<li>Upcoming talk "Hunting For Windows Remote Zero-days": <a href="https://bsidesistanbul.com/hossam-mohamed/">https://bsidesistanbul.com/hossam-mohamed/</a></li>
<li>Intro Music: Cascadia by Trash80 - <a href="https://trash80.com/#/content/133/weeklybeats-2012-week5">https://trash80.com/#/content/133/weeklybeats-2012-week5</a> (Released under Creative Commons)</li>
<li>Outro: Weak Knight by Devon Church - <a href="https://www.youtube.com/watch?v=LEOYtxvlnAY">https://www.youtube.com/watch?v=LEOYtxvlnAY</a></li>
</ul><br/>
<p><strong>Getting Into Infosec:</strong></p>
<ul>
<li>Website, Show Notes, Transcripts: <a href="https://gettingintoinfosec.com">https://gettingintoinfosec.com</a></li>
<li>Follow Me on Twitter: <a href="https://twitter.com/coffeewithayman">https://twitter.com/coffeewithayman</a></li>
<li>Subscribe To YouTube: <a href="https://www.youtube.com/channel/UCg6gV_gdfc188HZdN8LUx4A">https://www.youtube.com/channel/UCg6gV_gdfc188HZdN8LUx4A</a></li>
<li>Checkout My Book: <a href="https://www.amazon.com/Breaking-Step-Step-Starting-Information-ebook/dp/B07N15GTPC/">https://www.amazon.com/Breaking-Step-Step-Starting-Information-ebook/dp/B07N15GTPC/</a></li>
</ul><br/><p>See <a href="https://omnystudio.com/listener">omnystudio.com/listener</a> for privacy information.</p><p>Mentioned in this episode:</p><p><a href="https://getting-into-infosec.captivate.fm/stayintouch">Stay In Touch</a></p>]]></description><content:encoded><![CDATA[<p>A 19-year-old "not a security researcher" facing limitations because of his age and not having the right "prerequisites," Hossam has had to pave his own path. He also dreams in code and is one of the youngest OSCEs in the world!</p>
<p><strong>BIO</strong></p>
<p>Hossam Mohamed is one of the youngest OSCE in the world and currently working in the cybersecurity domain for a financial company in Istanbul. His area of interest includes exploit development, offensive security, secure web development, and malware analysis. He is a big Python lover.</p>
<p><strong>Notes</strong></p>
<ul>
<li>On the organizing team of BSides Istanbul</li>
<li>His best friend is a computer</li>
<li>Just finished high school last year!</li>
<li>Was doing freelance web design and security projects for clients</li>
<li>Taught himself assembly</li>
<li>Developing offensive security labs</li>
<li>Hacked his way to getting a job :)</li>
</ul><br/>
<p><strong>Quotes:</strong></p>
<ul>
<li>"Because I love [to] code."</li>
<li>"I wanted to understand how these games work." [5:56]</li>
<li>"I developed a project for my school. They liked it, but no one cared actually."</li>
<li>"No one in infosec doesn't play a little bit (hacking)." [8:04]</li>
<li>"Technical interview was great... didn't work because of my age and my education. I was only 18." [10:22]</li>
<li>"Do you ever dream in code?" "Actually... how did you know that?" [12:35]</li>
<li>"People think when it's about assembly and reverse engineering, omg it's untouchable... No, I'm telling you there is [a] much more lower level than that."</li>
<li>"I feel bad when I get sick because I don't go to work... I don't (get to) open my laptop and... code."</li>
<li>"When I'm far from my computer for two or three days... [I get] depressed."</li>
<li>"You can make it part of your day." [22:52]</li>
<li>"I wanted to send them the new domain controller password with the report. " [25:23]</li>
</ul><br/>
<p><strong>Links</strong></p>
<ul>
<li>Hosasm on Twitter: <a href="https://twitter.com/wazehell">https://twitter.com/wazehell</a></li>
<li>Hossam's Website: <a href="https://wazehell.io/">https://wazehell.io/</a></li>
<li>BSides Istanbul: <a href="https://bsidesistanbul.com/">https://bsidesistanbul.com/</a></li>
<li>Upcoming talk "Hunting For Windows Remote Zero-days": <a href="https://bsidesistanbul.com/hossam-mohamed/">https://bsidesistanbul.com/hossam-mohamed/</a></li>
<li>Intro Music: Cascadia by Trash80 - <a href="https://trash80.com/#/content/133/weeklybeats-2012-week5">https://trash80.com/#/content/133/weeklybeats-2012-week5</a> (Released under Creative Commons)</li>
<li>Outro: Weak Knight by Devon Church - <a href="https://www.youtube.com/watch?v=LEOYtxvlnAY">https://www.youtube.com/watch?v=LEOYtxvlnAY</a></li>
</ul><br/>
<p><strong>Getting Into Infosec:</strong></p>
<ul>
<li>Website, Show Notes, Transcripts: <a href="https://gettingintoinfosec.com">https://gettingintoinfosec.com</a></li>
<li>Follow Me on Twitter: <a href="https://twitter.com/coffeewithayman">https://twitter.com/coffeewithayman</a></li>
<li>Subscribe To YouTube: <a href="https://www.youtube.com/channel/UCg6gV_gdfc188HZdN8LUx4A">https://www.youtube.com/channel/UCg6gV_gdfc188HZdN8LUx4A</a></li>
<li>Checkout My Book: <a href="https://www.amazon.com/Breaking-Step-Step-Starting-Information-ebook/dp/B07N15GTPC/">https://www.amazon.com/Breaking-Step-Step-Starting-Information-ebook/dp/B07N15GTPC/</a></li>
</ul><br/><p>See <a href="https://omnystudio.com/listener">omnystudio.com/listener</a> for privacy information.</p><p>Mentioned in this episode:</p><p><a href="https://getting-into-infosec.captivate.fm/stayintouch">Stay In Touch</a></p>]]></content:encoded><link><![CDATA[https://getting-into-infosec.captivate.fm/episode/hossam-mohamed-young-hacker-to-not-a-security-researcher]]></link><guid isPermaLink="false">c7ffdb9e-d0e3-4d2b-8063-7e4165e6da4d</guid><itunes:image href="https://artwork.captivate.fm/05208e6b-b476-46c2-9da0-d4d3586b029f/image.jpg"/><dc:creator><![CDATA[Ayman Elsawah (@coffeewithayman)]]></dc:creator><pubDate>Sun, 26 May 2019 16:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/cc1207f6-5d83-41dc-91ef-fe7c5c3dfd25/audio.mp3" length="28060441" type="audio/mpeg"/><itunes:duration>29:14</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>23</itunes:episode><podcast:episode>23</podcast:episode><itunes:summary>A 19 year old &quot;not a security researcher&quot;. Facing limitations because of his age and not having the right &quot;prerequisites&quot; Hossam has had to make his own path. He also dreams in code and is one of the youngest OSCE&apos;s in the world!</itunes:summary><itunes:author>Ayman Elsawah (@coffeewithayman)</itunes:author></item><item><title>BONUS - Consuming VS Producing</title><itunes:title>BONUS - Consuming VS Producing</itunes:title><description><![CDATA[<p>My thoughts on consuming vs. production and how it relates to Getting Into Infosec. Sometimes, we get stuck learning, consuming security news, trends and etc, but we forget to produce something. Whether it be testing a new exploit we heard about, trying something new in our lab, or applying something we learned the day before, finding the right balance is important. If we're stuck, take little steps&mdash;better than no steps.</p>
<p><strong>Links:</strong></p>
<ul>
<li>
<p><a href="https://www.google.com/search?q=producing+vs+consuming">https://www.google.com/search?q=producing+vs+consuming</a></p>
</li>
<li>
<p><a href="https://lifehacker.com/start-every-day-as-a-producer-not-a-consumer-5887345">https://lifehacker.com/start-every-day-as-a-producer-not-a-consumer-5887345</a></p>
</li>
</ul><br/>
<p><strong>Getting Into Infosec:</strong></p>
<ul>
<li>
<p>Twitter: <a href="https://twitter.com/coffeewithayman">https://twitter.com/coffeewithayman</a></p>
</li>
<li>
<p>YouTube: <a href="https://www.youtube.com/channel/UCg6gV_gdfc188HZdN8LUx4A">https://www.youtube.com/channel/UCg6gV_gdfc188HZdN8LUx4A</a></p>
</li>
<li>
<p>Book: <a href="https://www.amazon.com/Breaking-Step-Step-Starting-Information-ebook/dp/B07N15GTPC/">https://www.amazon.com/Breaking-Step-Step-Starting-Information-ebook/dp/B07N15GTPC/</a></p>
</li>
</ul><br/><p>See <a href="https://omnystudio.com/listener">omnystudio.com/listener</a> for privacy information.</p><p>Mentioned in this episode:</p><p><a href="https://getting-into-infosec.captivate.fm/stayintouch">Stay In Touch</a></p>]]></description><content:encoded><![CDATA[<p>My thoughts on consuming vs. production and how it relates to Getting Into Infosec. Sometimes, we get stuck learning, consuming security news, trends and etc, but we forget to produce something. Whether it be testing a new exploit we heard about, trying something new in our lab, or applying something we learned the day before, finding the right balance is important. If we're stuck, take little steps&mdash;better than no steps.</p>
<p><strong>Links:</strong></p>
<ul>
<li>
<p><a href="https://www.google.com/search?q=producing+vs+consuming">https://www.google.com/search?q=producing+vs+consuming</a></p>
</li>
<li>
<p><a href="https://lifehacker.com/start-every-day-as-a-producer-not-a-consumer-5887345">https://lifehacker.com/start-every-day-as-a-producer-not-a-consumer-5887345</a></p>
</li>
</ul><br/>
<p><strong>Getting Into Infosec:</strong></p>
<ul>
<li>
<p>Twitter: <a href="https://twitter.com/coffeewithayman">https://twitter.com/coffeewithayman</a></p>
</li>
<li>
<p>YouTube: <a href="https://www.youtube.com/channel/UCg6gV_gdfc188HZdN8LUx4A">https://www.youtube.com/channel/UCg6gV_gdfc188HZdN8LUx4A</a></p>
</li>
<li>
<p>Book: <a href="https://www.amazon.com/Breaking-Step-Step-Starting-Information-ebook/dp/B07N15GTPC/">https://www.amazon.com/Breaking-Step-Step-Starting-Information-ebook/dp/B07N15GTPC/</a></p>
</li>
</ul><br/><p>See <a href="https://omnystudio.com/listener">omnystudio.com/listener</a> for privacy information.</p><p>Mentioned in this episode:</p><p><a href="https://getting-into-infosec.captivate.fm/stayintouch">Stay In Touch</a></p>]]></content:encoded><link><![CDATA[https://getting-into-infosec.captivate.fm/episode/bonus-consuming-vs-producing]]></link><guid isPermaLink="false">72d2e70a-64eb-4fbf-8c91-73424fb15e98</guid><itunes:image href="https://artwork.captivate.fm/343b0c30-3b53-44d5-bfbd-34944f26341e/image.jpg"/><dc:creator><![CDATA[Ayman Elsawah (@coffeewithayman)]]></dc:creator><pubDate>Tue, 21 May 2019 14:37:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/fd0a9df7-d808-47c9-a6b9-048897929359/audio.mp3" length="2395209" type="audio/mpeg"/><itunes:duration>02:30</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>bonus</itunes:episodeType><itunes:summary>My thoughts on consuming vs production and how it relates to Getting Into Infosec.</itunes:summary><itunes:author>Ayman Elsawah (@coffeewithayman)</itunes:author></item><item><title>Izzy - Random and Unplanned: From Annuities to ISO!</title><itunes:title>Izzy - Random and Unplanned: From Annuities to ISO!</itunes:title><description><![CDATA[<p>Ismaelle Vixsama (aka Izzy) has a knack for finding strategic flaws and speaking up about them. Doing so helped her get her first full-time job as well as have repercussions for defensive egos. Her whole career is a war story.</p>
<p><strong>BIO:</strong></p>
<p>Izzy is an ISMS manager with 7 years of experience. She has worked in FinTech, Government, and Security R&amp;D. Her work has allowed her to work on several mainstream products and services with some of the most well-recognized brands.</p>
<p><strong>Notes:</strong></p>
<ul>
<li>Creates a security program around a company's information systems</li>
<li>Played the CISO role initially, very CISO like role</li>
<li>First role in security was in Risk</li>
<li>Izzy comes from a very traditional Haitian back</li>
<li>Izzy came up with benefits at her job for an opportunity to learn something new and be in a non-toxic environment</li>
<li>First heard/learned about hacking at 15 from an AOL chat with a "hacker"</li>
<li>At 23, she decided to speak up in a meeting to provide feedback, which led to her being hired full-time</li>
</ul><br/>
<p><strong>Quotes:</strong></p>
<ul>
<li>"[By] the time I was 22 years old, the pay wasn't that great but for me. It was amazing because I was doing something I hated. I had benefits at my previous job, but this company was giving me an opportunity to learn something new. To me, that was so exciting."</li>
<li>"He looked at my resume and he said, 'I realize you have no cybersecurity experience.' By starting the conversation like that, it took some pressure off of my shoulders." [10:00]</li>
<li>"I was so nervous that he was going to drill into me about all these topics I had no clue about."</li>
<li>"I didn't even [know] I had sisters."</li>
<li>"Everyone just kinda wrote me off." [16:20]</li>
<li>"Who is the audience, what do we want to say here?" [21:13]</li>
<li>Worst comment ever: "We have to really train you on your critical thinking skills." [22:45]</li>
<li>"A good idea is a good idea, regardless of who it came from."</li>
<li>"My whole career is a war story." [32:05]</li>
</ul><br/>
<p><strong>Links</strong></p>
<ul>
<li>Izzy on Twitter: <a href="https://twitter.com/Is_Vix">https://twitter.com/Is_Vix</a></li>
<li>Her story is on Twitter: <a href="https://twitter.com/Is_Vix/status/1079218656138149889">https://twitter.com/Is_Vix/status/1079218656138149889</a></li>
<li>Izzy's Business, VixCyber: <a href="https://vixcyber.co/">https://vixcyber.co/</a></li>
<li>NIST Cybersecurity Framework: <a href="https://www.nist.gov/cyberframework">https://www.nist.gov/cyberframework</a></li>
<li>Intro Music: Cascadia by Trash80 - <a href="https://trash80.com/#/content/133/weeklybeats-2012-week5">https://trash80.com/#/content/133/weeklybeats-2012-week5</a> (Released under Creative Commons)</li>
<li>Outro Music: "Feather Duster" by Geographer: <a href="https://www.youtube.com/channel/UCcB_tnqYHwPzADwUdeppIIQ">https://www.youtube.com/channel/UCcB_tnqYHwPzADwUdeppIIQ</a></li>
</ul><br/>
<p><strong>Getting Into Infosec:</strong></p>
<ul>
<li>Twitter: <a href="https://twitter.com/coffeewithayman">https://twitter.com/coffeewithayman</a></li>
<li>YouTube: <a href="https://www.youtube.com/channel/UCg6gV_gdfc188HZdN8LUx4A">https://www.youtube.com/channel/UCg6gV_gdfc188HZdN8LUx4A</a></li>
<li>Book: <a href="https://t.co/DDXxfVwpD7">https://t.co/DDXxfVwpD7</a></li>
</ul><br/><p>See <a href="https://omnystudio.com/listener">omnystudio.com/listener</a> for privacy information.</p><p>Mentioned in this episode:</p><p><a href="https://getting-into-infosec.captivate.fm/stayintouch">Stay In Touch</a></p>]]></description><content:encoded><![CDATA[<p>Ismaelle Vixsama (aka Izzy) has a knack for finding strategic flaws and speaking up about them. Doing so helped her get her first full-time job as well as have repercussions for defensive egos. Her whole career is a war story.</p>
<p><strong>BIO:</strong></p>
<p>Izzy is an ISMS manager with 7 years of experience. She has worked in FinTech, Government, and Security R&amp;D. Her work has allowed her to work on several mainstream products and services with some of the most well-recognized brands.</p>
<p><strong>Notes:</strong></p>
<ul>
<li>Creates a security program around a company's information systems</li>
<li>Played the CISO role initially, very CISO like role</li>
<li>First role in security was in Risk</li>
<li>Izzy comes from a very traditional Haitian back</li>
<li>Izzy came up with benefits at her job for an opportunity to learn something new and be in a non-toxic environment</li>
<li>First heard/learned about hacking at 15 from an AOL chat with a "hacker"</li>
<li>At 23, she decided to speak up in a meeting to provide feedback, which led to her being hired full-time</li>
</ul><br/>
<p><strong>Quotes:</strong></p>
<ul>
<li>"[By] the time I was 22 years old, the pay wasn't that great but for me. It was amazing because I was doing something I hated. I had benefits at my previous job, but this company was giving me an opportunity to learn something new. To me, that was so exciting."</li>
<li>"He looked at my resume and he said, 'I realize you have no cybersecurity experience.' By starting the conversation like that, it took some pressure off of my shoulders." [10:00]</li>
<li>"I was so nervous that he was going to drill into me about all these topics I had no clue about."</li>
<li>"I didn't even [know] I had sisters."</li>
<li>"Everyone just kinda wrote me off." [16:20]</li>
<li>"Who is the audience, what do we want to say here?" [21:13]</li>
<li>Worst comment ever: "We have to really train you on your critical thinking skills." [22:45]</li>
<li>"A good idea is a good idea, regardless of who it came from."</li>
<li>"My whole career is a war story." [32:05]</li>
</ul><br/>
<p><strong>Links</strong></p>
<ul>
<li>Izzy on Twitter: <a href="https://twitter.com/Is_Vix">https://twitter.com/Is_Vix</a></li>
<li>Her story is on Twitter: <a href="https://twitter.com/Is_Vix/status/1079218656138149889">https://twitter.com/Is_Vix/status/1079218656138149889</a></li>
<li>Izzy's Business, VixCyber: <a href="https://vixcyber.co/">https://vixcyber.co/</a></li>
<li>NIST Cybersecurity Framework: <a href="https://www.nist.gov/cyberframework">https://www.nist.gov/cyberframework</a></li>
<li>Intro Music: Cascadia by Trash80 - <a href="https://trash80.com/#/content/133/weeklybeats-2012-week5">https://trash80.com/#/content/133/weeklybeats-2012-week5</a> (Released under Creative Commons)</li>
<li>Outro Music: "Feather Duster" by Geographer: <a href="https://www.youtube.com/channel/UCcB_tnqYHwPzADwUdeppIIQ">https://www.youtube.com/channel/UCcB_tnqYHwPzADwUdeppIIQ</a></li>
</ul><br/>
<p><strong>Getting Into Infosec:</strong></p>
<ul>
<li>Twitter: <a href="https://twitter.com/coffeewithayman">https://twitter.com/coffeewithayman</a></li>
<li>YouTube: <a href="https://www.youtube.com/channel/UCg6gV_gdfc188HZdN8LUx4A">https://www.youtube.com/channel/UCg6gV_gdfc188HZdN8LUx4A</a></li>
<li>Book: <a href="https://t.co/DDXxfVwpD7">https://t.co/DDXxfVwpD7</a></li>
</ul><br/><p>See <a href="https://omnystudio.com/listener">omnystudio.com/listener</a> for privacy information.</p><p>Mentioned in this episode:</p><p><a href="https://getting-into-infosec.captivate.fm/stayintouch">Stay In Touch</a></p>]]></content:encoded><link><![CDATA[https://getting-into-infosec.captivate.fm/episode/izzy-random-and-unplanned-from-annuities-to-iso]]></link><guid isPermaLink="false">16e1a464-3b9f-49f2-ba5e-ba819480d393</guid><itunes:image href="https://artwork.captivate.fm/baccdb78-cb46-4991-be98-660f51738f90/image.jpg"/><dc:creator><![CDATA[Ayman Elsawah (@coffeewithayman)]]></dc:creator><pubDate>Sun, 12 May 2019 23:15:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/26fced1d-9910-4b26-99d3-0c6eda63d5ec/audio.mp3" length="35087998" type="audio/mpeg"/><itunes:duration>36:33</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>22</itunes:episode><podcast:episode>22</podcast:episode><itunes:summary>Ismaelle Vixsama (aka Izzy) has a knack for finding strategic flaws and speaking up about them. Doing so helped her get her first full-time job as well as have repercussions for defensive egos. Her whole career is a war story.</itunes:summary><itunes:author>Ayman Elsawah (@coffeewithayman)</itunes:author></item><item><title>David Scrobonia - Lifelong builder, Appsec Engineer, Creator of ZAP Heads Up Display</title><itunes:title>David Scrobonia - Lifelong builder, Appsec Engineer, Creator of ZAP Heads Up Display</itunes:title><description><![CDATA[<p>From Zero to One, David is a lifelong builder. Wherever he goes, he just builds things. From an electric car to Adhoc android apps to ZAP HUD to an awesome heads up display for ZAP Proxy, he's a game-changer, IMHO. We discuss the lack of UX in the security tooling community, how contributing to Open Source got him his job, and even about imposter syndrome.</p>
<p><strong>BIO</strong></p>
<p>David Scrobonia is part of the Security Engineering team at Segment, working to secure modern web apps and AWS infrastructure. He contributes to open source in his spare time and leads development for the OWASP ZAP Heads Up Display project.</p>
<p><strong>Notes</strong></p>
<ul>
<li>Mostly interested in architecture and mechanical engineering when younger.</li>
<li>Built his own electric car with his dad, out of a Porsche 914!</li>
<li>David explains XSS and why certain languages are better than others, such as React</li>
<li>David gets lost in El Segundo. Yes.</li>
</ul><br/>
<p><strong>Quotes</strong></p>
<ul>
<li>"It's just a program that listens to these silly protocols."</li>
<li>"I wanted to do more hands-on stuff, [and] quickly fell in love with the coding side as a lot of people do."</li>
<li>"I was like... what's GET? What's POST? What do you mean?"</li>
<li>"Before you know it, right? It seems so daunting."</li>
<li>"Still plenty of opportunities out there. [It] will be a long time before the world is perfect and secure."</li>
<li>"I've been working in the security industry, but I didn't really feel part of any security community."</li>
<li>"I have nothing but good things to say about the open-source community."</li>
<li>"They're (security tools) just not built with user experience first."</li>
<li>"I think people underestimate what they are able to contribute."</li>
</ul><br/>
<p><strong>Links</strong></p>
<ul>
<li>David on Twitter: <a href="https://twitter.com/david_scrobonia">https://twitter.com/david_scrobonia</a></li>
<li>Rube Goldberg Machine: <a href="https://en.wikipedia.org/wiki/Rube_Goldberg_machine">https://en.wikipedia.org/wiki/Rube_Goldberg_machine</a></li>
<li>Dan Boneh's Cryptography Course: <a href="https://crypto.stanford.edu/~dabo/courses/OnlineCrypto/">https://crypto.stanford.edu/~dabo/courses/OnlineCrypto/</a></li>
<li>OWASP Appsensor Project: <a href="https://www.owasp.org/index.php/OWASP_AppSensor_Project">https://www.owasp.org/index.php/OWASP_AppSensor_Project</a></li>
<li>Zap Proxy Heads Up Display (HUD): <a href="https://github.com/zaproxy/zap-hud">https://github.com/zaproxy/zap-hud</a></li>
<li>Article by David on Zap HUD: <a href="https://segment.com/blog/hacking-with-a-heads-up-display/">https://segment.com/blog/hacking-with-a-heads-up-display/</a></li>
<li>Brakeman Pro: <a href="https://brakemanpro.com/">https://brakemanpro.com/</a></li>
<li><a href="https://samsclass.info">https://samsclass.info</a></li>
<li>My talk at Sam's class: <a href="https://www.youtube.com/watch?v=KJvPHZGtGdM">https://www.youtube.com/watch?v=KJvPHZGtGdM</a></li>
<li>Intro: Cascadia by Trash80 (<a href="https://trash80.com">https://trash80.com</a>) Licensed Under Creative Commons</li>
<li>Outro: Cancun by Topher Mohr and Alex Elena</li>
</ul><br/>
<p><strong>Getting Into Infosec:</strong></p>
<ul>
<li>Twitter: <a href="https://twitter.com/coffeewithayman">https://twitter.com/coffeewithayman</a></li>
<li>YouTube: <a href="https://www.youtube.com/channel/UCg6gV_gdfc188HZdN8LUx4A">https://www.youtube.com/channel/UCg6gV_gdfc188HZdN8LUx4A</a></li>
<li>Book: <a href="https://www.amazon.com/Breaking-Step-Step-Starting-Information-ebook/dp/B07N15GTPC/">https://www.amazon.com/Breaking-Step-Step-Starting-Information-ebook/dp/B07N15GTPC/</a></li>
</ul><br/><p>See <a href="https://omnystudio.com/listener">omnystudio.com/listener</a> for privacy information.</p><p>Mentioned in this episode:</p><p><a href="https://getting-into-infosec.captivate.fm/stayintouch">Stay In Touch</a></p>]]></description><content:encoded><![CDATA[<p>From Zero to One, David is a lifelong builder. Wherever he goes, he just builds things. From an electric car to Adhoc android apps to ZAP HUD to an awesome heads up display for ZAP Proxy, he's a game-changer, IMHO. We discuss the lack of UX in the security tooling community, how contributing to Open Source got him his job, and even about imposter syndrome.</p>
<p><strong>BIO</strong></p>
<p>David Scrobonia is part of the Security Engineering team at Segment, working to secure modern web apps and AWS infrastructure. He contributes to open source in his spare time and leads development for the OWASP ZAP Heads Up Display project.</p>
<p><strong>Notes</strong></p>
<ul>
<li>Mostly interested in architecture and mechanical engineering when younger.</li>
<li>Built his own electric car with his dad, out of a Porsche 914!</li>
<li>David explains XSS and why certain languages are better than others, such as React</li>
<li>David gets lost in El Segundo. Yes.</li>
</ul><br/>
<p><strong>Quotes</strong></p>
<ul>
<li>"It's just a program that listens to these silly protocols."</li>
<li>"I wanted to do more hands-on stuff, [and] quickly fell in love with the coding side as a lot of people do."</li>
<li>"I was like... what's GET? What's POST? What do you mean?"</li>
<li>"Before you know it, right? It seems so daunting."</li>
<li>"Still plenty of opportunities out there. [It] will be a long time before the world is perfect and secure."</li>
<li>"I've been working in the security industry, but I didn't really feel part of any security community."</li>
<li>"I have nothing but good things to say about the open-source community."</li>
<li>"They're (security tools) just not built with user experience first."</li>
<li>"I think people underestimate what they are able to contribute."</li>
</ul><br/>
<p><strong>Links</strong></p>
<ul>
<li>David on Twitter: <a href="https://twitter.com/david_scrobonia">https://twitter.com/david_scrobonia</a></li>
<li>Rube Goldberg Machine: <a href="https://en.wikipedia.org/wiki/Rube_Goldberg_machine">https://en.wikipedia.org/wiki/Rube_Goldberg_machine</a></li>
<li>Dan Boneh's Cryptography Course: <a href="https://crypto.stanford.edu/~dabo/courses/OnlineCrypto/">https://crypto.stanford.edu/~dabo/courses/OnlineCrypto/</a></li>
<li>OWASP Appsensor Project: <a href="https://www.owasp.org/index.php/OWASP_AppSensor_Project">https://www.owasp.org/index.php/OWASP_AppSensor_Project</a></li>
<li>Zap Proxy Heads Up Display (HUD): <a href="https://github.com/zaproxy/zap-hud">https://github.com/zaproxy/zap-hud</a></li>
<li>Article by David on Zap HUD: <a href="https://segment.com/blog/hacking-with-a-heads-up-display/">https://segment.com/blog/hacking-with-a-heads-up-display/</a></li>
<li>Brakeman Pro: <a href="https://brakemanpro.com/">https://brakemanpro.com/</a></li>
<li><a href="https://samsclass.info">https://samsclass.info</a></li>
<li>My talk at Sam's class: <a href="https://www.youtube.com/watch?v=KJvPHZGtGdM">https://www.youtube.com/watch?v=KJvPHZGtGdM</a></li>
<li>Intro: Cascadia by Trash80 (<a href="https://trash80.com">https://trash80.com</a>) Licensed Under Creative Commons</li>
<li>Outro: Cancun by Topher Mohr and Alex Elena</li>
</ul><br/>
<p><strong>Getting Into Infosec:</strong></p>
<ul>
<li>Twitter: <a href="https://twitter.com/coffeewithayman">https://twitter.com/coffeewithayman</a></li>
<li>YouTube: <a href="https://www.youtube.com/channel/UCg6gV_gdfc188HZdN8LUx4A">https://www.youtube.com/channel/UCg6gV_gdfc188HZdN8LUx4A</a></li>
<li>Book: <a href="https://www.amazon.com/Breaking-Step-Step-Starting-Information-ebook/dp/B07N15GTPC/">https://www.amazon.com/Breaking-Step-Step-Starting-Information-ebook/dp/B07N15GTPC/</a></li>
</ul><br/><p>See <a href="https://omnystudio.com/listener">omnystudio.com/listener</a> for privacy information.</p><p>Mentioned in this episode:</p><p><a href="https://getting-into-infosec.captivate.fm/stayintouch">Stay In Touch</a></p>]]></content:encoded><link><![CDATA[https://getting-into-infosec.captivate.fm/episode/david-scrobonia-lifelong-builder-appsec-engineer-creator-of-zap-heads-up-display]]></link><guid isPermaLink="false">f69fb1d3-ae72-4b44-9398-e96da45e8f05</guid><itunes:image href="https://artwork.captivate.fm/77bab757-ac9c-432c-b7bb-0a96b5f4bb79/image.jpg"/><dc:creator><![CDATA[Ayman Elsawah (@coffeewithayman)]]></dc:creator><pubDate>Fri, 03 May 2019 23:25:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/ae7f621e-abed-4df4-bada-cb7811b2d0ba/audio.mp3" length="33811584" type="audio/mpeg"/><itunes:duration>35:13</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>21</itunes:episode><podcast:episode>21</podcast:episode><itunes:summary>From Zero to One, David is a lifelong builder. Wherever he goes he just builds things. From an electric car to adhoc android apps to ZAP HUD, an awesome heads up display for ZAP Proxy, a game changer imho.</itunes:summary><itunes:author>Ayman Elsawah (@coffeewithayman)</itunes:author></item><item><title>BONUS - CliffsNotes To The First 20 Episodes!</title><itunes:title>BONUS - CliffsNotes To The First 20 Episodes!</itunes:title><description><![CDATA[<p>Having completed 20 episodes, I decided to take a moment to go over each episode briefly.</p>
<p>Thanks to call my guests!</p>
<p>Ep01 - Dan Borges: <a href="https://twitter.com/1njection">https://twitter.com/1njection</a></p>
<p>Ep02 - 0daySimpson: <a href="https://twitter.com/0daySimpson">https://twitter.com/0daySimpson</a></p>
<p>Ep03 - Christina Hanson</p>
<p>Ep04 - Matt Toth: <a href="https://twitter.com/willhackforfood">https://twitter.com/willhackforfood</a></p>
<p>Ep05 - Rob Carson: <a href="https://twitter.com/robcarson05">https://twitter.com/robcarson05</a></p>
<p>Ep06 - Robin Stuart: <a href="https://twitter.com/rcstuart">https://twitter.com/rcstuart</a></p>
<p>Ep07 - Clay Wells: <a href="https://twitter.com/ttheveii0x">https://twitter.com/ttheveii0x</a></p>
<p>Ep08 - Elvis Chan: <a href="https://twitter.com/FBISanFrancisco">https://twitter.com/FBISanFrancisco</a></p>
<p>Ep09 - Virtual Kyle Kennedy: <a href="https://twitter.com/Kyle_F_Kennedy">https://twitter.com/Kyle_F_Kennedy</a></p>
<p>Ep10 - InfoSteph: <a href="https://twitter.com/StephandSec">https://twitter.com/StephandSec</a></p>
<p>Ep11 - Yaron Levi: <a href="https://twitter.com/0xL3v1">https://twitter.com/0xL3v1</a></p>
<p>Ep12 - Jack Rhysider: <a href="https://twitter.com/JackRhysider">https://twitter.com/JackRhysider</a></p>
<p>Ep13 - Marcus Carey: <a href="https://twitter.com/marcusjcarey">https://twitter.com/marcusjcarey</a></p>
<p>Ep14 - Nipun Gupta: <a href="https://twitter.com/nipungupta">https://twitter.com/nipungupta</a></p>
<p>Ep15 - Adrian Kaylor: <a href="https://twitter.com/AdrianKaylor">https://twitter.com/AdrianKaylor</a></p>
<p>Ep16 - InfosecSherpa: <a href="https://twitter.com/InfoSecSherpa">https://twitter.com/InfoSecSherpa</a></p>
<p>Ep17 - InfosecJon: <a href="https://twitter.com/InfoSecJon">https://twitter.com/InfoSecJon</a></p>
<p>Ep18 - Masha Sedova: <a href="https://twitter.com/modMasha">https://twitter.com/modMasha</a></p>
<p>Ep19 - Jared Folkins: <a href="https://twitter.com/JF0LKINS">https://twitter.com/JF0LKINS</a></p>
<p>Ep20 - Leron Gray:<a href="https://twitter.com/mcohmi"> https://twitter.com/mcohmi</a></p>
<p><strong>Getting Into Infosec:</strong></p>
<ul>
<li>
<p>Twitter: <a href="https://twitter.com/coffeewithayman">https://twitter.com/coffeewithayman</a></p>
</li>
<li>
<p>YouTube: <a href="https://www.youtube.com/channel/UCg6gV_gdfc188HZdN8LUx4A">https://www.youtube.com/channel/UCg6gV_gdfc188HZdN8LUx4A</a></p>
</li>
<li>
<p>Book: <a href="https://www.amazon.com/Breaking-Step-Step-Starting-Information-ebook/dp/B07N15GTPC/">https://www.amazon.com/Breaking-Step-Step-Starting-Information-ebook/dp/B07N15GTPC/</a></p>
</li>
</ul><br/><p>See <a href="https://omnystudio.com/listener">omnystudio.com/listener</a> for privacy information.</p><p>Mentioned in this episode:</p><p><a href="https://getting-into-infosec.captivate.fm/stayintouch">Stay In Touch</a></p>]]></description><content:encoded><![CDATA[<p>Having completed 20 episodes, I decided to take a moment to go over each episode briefly.</p>
<p>Thanks to call my guests!</p>
<p>Ep01 - Dan Borges: <a href="https://twitter.com/1njection">https://twitter.com/1njection</a></p>
<p>Ep02 - 0daySimpson: <a href="https://twitter.com/0daySimpson">https://twitter.com/0daySimpson</a></p>
<p>Ep03 - Christina Hanson</p>
<p>Ep04 - Matt Toth: <a href="https://twitter.com/willhackforfood">https://twitter.com/willhackforfood</a></p>
<p>Ep05 - Rob Carson: <a href="https://twitter.com/robcarson05">https://twitter.com/robcarson05</a></p>
<p>Ep06 - Robin Stuart: <a href="https://twitter.com/rcstuart">https://twitter.com/rcstuart</a></p>
<p>Ep07 - Clay Wells: <a href="https://twitter.com/ttheveii0x">https://twitter.com/ttheveii0x</a></p>
<p>Ep08 - Elvis Chan: <a href="https://twitter.com/FBISanFrancisco">https://twitter.com/FBISanFrancisco</a></p>
<p>Ep09 - Virtual Kyle Kennedy: <a href="https://twitter.com/Kyle_F_Kennedy">https://twitter.com/Kyle_F_Kennedy</a></p>
<p>Ep10 - InfoSteph: <a href="https://twitter.com/StephandSec">https://twitter.com/StephandSec</a></p>
<p>Ep11 - Yaron Levi: <a href="https://twitter.com/0xL3v1">https://twitter.com/0xL3v1</a></p>
<p>Ep12 - Jack Rhysider: <a href="https://twitter.com/JackRhysider">https://twitter.com/JackRhysider</a></p>
<p>Ep13 - Marcus Carey: <a href="https://twitter.com/marcusjcarey">https://twitter.com/marcusjcarey</a></p>
<p>Ep14 - Nipun Gupta: <a href="https://twitter.com/nipungupta">https://twitter.com/nipungupta</a></p>
<p>Ep15 - Adrian Kaylor: <a href="https://twitter.com/AdrianKaylor">https://twitter.com/AdrianKaylor</a></p>
<p>Ep16 - InfosecSherpa: <a href="https://twitter.com/InfoSecSherpa">https://twitter.com/InfoSecSherpa</a></p>
<p>Ep17 - InfosecJon: <a href="https://twitter.com/InfoSecJon">https://twitter.com/InfoSecJon</a></p>
<p>Ep18 - Masha Sedova: <a href="https://twitter.com/modMasha">https://twitter.com/modMasha</a></p>
<p>Ep19 - Jared Folkins: <a href="https://twitter.com/JF0LKINS">https://twitter.com/JF0LKINS</a></p>
<p>Ep20 - Leron Gray:<a href="https://twitter.com/mcohmi"> https://twitter.com/mcohmi</a></p>
<p><strong>Getting Into Infosec:</strong></p>
<ul>
<li>
<p>Twitter: <a href="https://twitter.com/coffeewithayman">https://twitter.com/coffeewithayman</a></p>
</li>
<li>
<p>YouTube: <a href="https://www.youtube.com/channel/UCg6gV_gdfc188HZdN8LUx4A">https://www.youtube.com/channel/UCg6gV_gdfc188HZdN8LUx4A</a></p>
</li>
<li>
<p>Book: <a href="https://www.amazon.com/Breaking-Step-Step-Starting-Information-ebook/dp/B07N15GTPC/">https://www.amazon.com/Breaking-Step-Step-Starting-Information-ebook/dp/B07N15GTPC/</a></p>
</li>
</ul><br/><p>See <a href="https://omnystudio.com/listener">omnystudio.com/listener</a> for privacy information.</p><p>Mentioned in this episode:</p><p><a href="https://getting-into-infosec.captivate.fm/stayintouch">Stay In Touch</a></p>]]></content:encoded><link><![CDATA[https://getting-into-infosec.captivate.fm/episode/bonus-cliffsnotes-to-the-first-20-episodes]]></link><guid isPermaLink="false">7c378586-0577-4346-93a6-f11a5787e8e6</guid><itunes:image href="https://artwork.captivate.fm/6de8208f-9236-40d4-a324-9a4d93910c95/image.jpg"/><dc:creator><![CDATA[Ayman Elsawah (@coffeewithayman)]]></dc:creator><pubDate>Sat, 27 Apr 2019 06:38:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/563e990c-37ec-403e-9d6a-e0af260bf442/audio.mp3" length="30092544" type="audio/mpeg"/><itunes:duration>31:21</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>bonus</itunes:episodeType><itunes:summary>Having completed 20 episodes (~15 hours of interviews), I decided to take a moment to go over each episode briefly.</itunes:summary><itunes:author>Ayman Elsawah (@coffeewithayman)</itunes:author></item><item><title>BONUS - MCOHMI New Song, Trap Music, and Domain Song Background</title><itunes:title>BONUS - MCOHMI New Song, Trap Music, and Domain Song Background</itunes:title><description><![CDATA[<p>MC OHM-I (Leron Gray) talks about his next project about tabs in the browser, trap music, and some background on his awesome song, "Domain."</p>
<p><strong>Getting Into Infosec</strong></p>
<ul>
<li>
<p>Twitter: <a href="https://twitter.com/coffeewithayman">https://twitter.com/coffeewithayman</a></p>
</li>
<li>
<p>YouTube: <a href="https://www.youtube.com/channel/UCg6gV_gdfc188HZdN8LUx4A">https://www.youtube.com/channel/UCg6gV_gdfc188HZdN8LUx4A</a></p>
</li>
<li>
<p>Book: <a href="https://www.amazon.com/Breaking-Step-Step-Starting-Information-ebook/dp/B07N15GTPC/">https://www.amazon.com/Breaking-Step-Step-Starting-Information-ebook/dp/B07N15GTPC/</a></p>
</li>
</ul><br/><p>See <a href="https://omnystudio.com/listener">omnystudio.com/listener</a> for privacy information.</p><p>Mentioned in this episode:</p><p><a href="https://getting-into-infosec.captivate.fm/stayintouch">Stay In Touch</a></p>]]></description><content:encoded><![CDATA[<p>MC OHM-I (Leron Gray) talks about his next project about tabs in the browser, trap music, and some background on his awesome song, "Domain."</p>
<p><strong>Getting Into Infosec</strong></p>
<ul>
<li>
<p>Twitter: <a href="https://twitter.com/coffeewithayman">https://twitter.com/coffeewithayman</a></p>
</li>
<li>
<p>YouTube: <a href="https://www.youtube.com/channel/UCg6gV_gdfc188HZdN8LUx4A">https://www.youtube.com/channel/UCg6gV_gdfc188HZdN8LUx4A</a></p>
</li>
<li>
<p>Book: <a href="https://www.amazon.com/Breaking-Step-Step-Starting-Information-ebook/dp/B07N15GTPC/">https://www.amazon.com/Breaking-Step-Step-Starting-Information-ebook/dp/B07N15GTPC/</a></p>
</li>
</ul><br/><p>See <a href="https://omnystudio.com/listener">omnystudio.com/listener</a> for privacy information.</p><p>Mentioned in this episode:</p><p><a href="https://getting-into-infosec.captivate.fm/stayintouch">Stay In Touch</a></p>]]></content:encoded><link><![CDATA[https://getting-into-infosec.captivate.fm/episode/bonus-mcohmi-new-song-trap-music-and-domain-song-background]]></link><guid isPermaLink="false">1f8c54c0-b292-426e-a460-f2052e24802a</guid><itunes:image href="https://artwork.captivate.fm/7226c538-1363-466b-9329-6cedb931c1ac/image.jpg"/><dc:creator><![CDATA[Ayman Elsawah (@coffeewithayman)]]></dc:creator><pubDate>Wed, 17 Apr 2019 13:01:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/817faed4-b860-417d-aaba-be39cbbfb3cf/audio.mp3" length="4245129" type="audio/mpeg"/><itunes:duration>04:25</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>bonus</itunes:episodeType><itunes:summary>MC OHM-I (Leron Gray) talks about his next project about tabs in the browser, trap music, and some background on his awesome song Domain.</itunes:summary><itunes:author>Ayman Elsawah (@coffeewithayman)</itunes:author></item><item><title>Leron Gray - From Navy E6 to Pentester, SANS Mentor and Nerdcore Rapper!</title><itunes:title>Leron Gray - From Navy E6 to Pentester, SANS Mentor and Nerdcore Rapper!</itunes:title><description><![CDATA[<p>Leron Gray is a man of many talents. Although he didn't really get into infosec until much later in life, he always had a creative side. He now finds himself as a pentester working from home and a nerdcore rapper producing amazing beats!</p>
<p><strong>BIO</strong></p>
<p>Leron is a penetration tester and a ten-year Navy veteran with four years of experience as a Cryptologic Technician (Networks), focusing primarily on offensive cyber operations. He holds a Bachelor's degree from Dakota State University in Cyber Operations. With a passion for Python, he loves automating tedious daily routine tasks for efficiency and considers himself to always be in a position to learn more and pass on knowledge. He always enjoys competing in as many Capture-the-Flag events as possible and also often performs as a nerdcore rapper.</p>
<p>Leron currently holds eCPPT, eWPT, GPYC, GPEN, GAWN, GCFE, and GICSP certifications. He also maintains a <a href="https://daddycocoaman.dev/">blog</a> and maintains an active <a href="https://twitter.com/mcohmi">Twitter</a> discussing music, information security, and wrestling.</p>
<p><strong>Notes</strong></p>
<ul>
<li>
<p>Went to a high school that made you choose majors</p>
</li>
<li>
<p>Grew up poor, was not allowed to go out much</p>
</li>
<li>
<p>Technological learning came from school</p>
</li>
<li>
<p>Didn't really get into computers until he was 25</p>
</li>
<li>
<p>Has been in music since Jr. High School (Marching band, jazz band, and concert band... all the bands)</p>
</li>
<li>
<p>Networking is the biggest thing that Leron says would help</p>
</li>
<li>
<p>Leron offers his passionate opinion on "aptitude" (it's a pet peeve of his)</p>
</li>
</ul><br/>
<p><strong>Quotes</strong></p>
<ul>
<li>
<p>"I learned a lot... I made sure not to waste any opportunity for learning."</p>
</li>
<li>
<p>"Job searching, in general, is a pain."</p>
</li>
<li>
<p>"I don't think I would be where I am right now if I hadn't gone out and made that effort."</p>
</li>
<li>
<p>"One of the big deals that people had were degrees. I wasn't really sure why; I have 10 years of IT/Cyber experience."</p>
</li>
<li>
<p>"It turned out the company no longer owned that server. Their DNS was still pointing to it though."</p>
</li>
<li>
<p>"I took Java in high school and was really bad at it and I found out everyone is bad at Java, so it doesn't really matter."</p>
</li>
<li>
<p>"It's so much easier to learn when you have a problem to fix."</p>
</li>
<li>
<p>"It's not even just information security that learning Python could help... it could be anything you do... often enough to warrant not to do it [manually]."</p>
</li>
<li>
<p>"Nobody does a CTF and expects not to learn something by the time they leave."</p>
</li>
<li>
<p>"Job searches shouldn't be like that: they should be based on your merit."</p>
</li>
<li>
<p>"Maybe the person can't get OSCP, but maybe they have the skills or knowledge."</p>
</li>
<li>
<p>"The idea of aptitude... raises too many borders."</p>
</li>
</ul><br/>
<p><strong>Links</strong></p>
<ul>
<li>
<p>Leron on Twitter: <a href="https://twitter.com/mcohmi">https://twitter.com/mcohmi</a></p>
</li>
<li>
<p>Leron's Blog: <a href="https://daddycocoaman.dev/">https://daddycocoaman.dev/</a></p>
</li>
<li>
<p>Leron's GitHub: <a href="https://github.com/daddycocoaman">https://github.com/daddycocoaman</a></p>
</li>
<li>
<p>Class that Leron Is Mentoring: <a href="https://www.sans.org/mentor/class/sec573-seattle-19mar2019-leron-gray">https://www.sans.org/mentor/class/sec573-seattle-19mar2019-leron-gray</a></p>
</li>
<li>
<p>Visual Studio Code: <a href="https://code.visualstudio.com/">https://code.visualstudio.com/</a></p>
</li>
<li>
<p>PyCharm: <a href="https://www.jetbrains.com/pycharm/">https://www.jetbrains.com/pycharm/</a></p>
</li>
<li>
<p>IPython Notebook: <a...]]></description><content:encoded><![CDATA[<p>Leron Gray is a man of many talents. Although he didn't really get into infosec until much later in life, he always had a creative side. He now finds himself as a pentester working from home and a nerdcore rapper producing amazing beats!</p>
<p><strong>BIO</strong></p>
<p>Leron is a penetration tester and a ten-year Navy veteran with four years of experience as a Cryptologic Technician (Networks), focusing primarily on offensive cyber operations. He holds a Bachelor's degree from Dakota State University in Cyber Operations. With a passion for Python, he loves automating tedious daily routine tasks for efficiency and considers himself to always be in a position to learn more and pass on knowledge. He always enjoys competing in as many Capture-the-Flag events as possible and also often performs as a nerdcore rapper.</p>
<p>Leron currently holds eCPPT, eWPT, GPYC, GPEN, GAWN, GCFE, and GICSP certifications. He also maintains a <a href="https://daddycocoaman.dev/">blog</a> and maintains an active <a href="https://twitter.com/mcohmi">Twitter</a> discussing music, information security, and wrestling.</p>
<p><strong>Notes</strong></p>
<ul>
<li>
<p>Went to a high school that made you choose majors</p>
</li>
<li>
<p>Grew up poor, was not allowed to go out much</p>
</li>
<li>
<p>Technological learning came from school</p>
</li>
<li>
<p>Didn't really get into computers until he was 25</p>
</li>
<li>
<p>Has been in music since Jr. High School (Marching band, jazz band, and concert band... all the bands)</p>
</li>
<li>
<p>Networking is the biggest thing that Leron says would help</p>
</li>
<li>
<p>Leron offers his passionate opinion on "aptitude" (it's a pet peeve of his)</p>
</li>
</ul><br/>
<p><strong>Quotes</strong></p>
<ul>
<li>
<p>"I learned a lot... I made sure not to waste any opportunity for learning."</p>
</li>
<li>
<p>"Job searching, in general, is a pain."</p>
</li>
<li>
<p>"I don't think I would be where I am right now if I hadn't gone out and made that effort."</p>
</li>
<li>
<p>"One of the big deals that people had were degrees. I wasn't really sure why; I have 10 years of IT/Cyber experience."</p>
</li>
<li>
<p>"It turned out the company no longer owned that server. Their DNS was still pointing to it though."</p>
</li>
<li>
<p>"I took Java in high school and was really bad at it and I found out everyone is bad at Java, so it doesn't really matter."</p>
</li>
<li>
<p>"It's so much easier to learn when you have a problem to fix."</p>
</li>
<li>
<p>"It's not even just information security that learning Python could help... it could be anything you do... often enough to warrant not to do it [manually]."</p>
</li>
<li>
<p>"Nobody does a CTF and expects not to learn something by the time they leave."</p>
</li>
<li>
<p>"Job searches shouldn't be like that: they should be based on your merit."</p>
</li>
<li>
<p>"Maybe the person can't get OSCP, but maybe they have the skills or knowledge."</p>
</li>
<li>
<p>"The idea of aptitude... raises too many borders."</p>
</li>
</ul><br/>
<p><strong>Links</strong></p>
<ul>
<li>
<p>Leron on Twitter: <a href="https://twitter.com/mcohmi">https://twitter.com/mcohmi</a></p>
</li>
<li>
<p>Leron's Blog: <a href="https://daddycocoaman.dev/">https://daddycocoaman.dev/</a></p>
</li>
<li>
<p>Leron's GitHub: <a href="https://github.com/daddycocoaman">https://github.com/daddycocoaman</a></p>
</li>
<li>
<p>Class that Leron Is Mentoring: <a href="https://www.sans.org/mentor/class/sec573-seattle-19mar2019-leron-gray">https://www.sans.org/mentor/class/sec573-seattle-19mar2019-leron-gray</a></p>
</li>
<li>
<p>Visual Studio Code: <a href="https://code.visualstudio.com/">https://code.visualstudio.com/</a></p>
</li>
<li>
<p>PyCharm: <a href="https://www.jetbrains.com/pycharm/">https://www.jetbrains.com/pycharm/</a></p>
</li>
<li>
<p>IPython Notebook: <a href="https://ipython.org/notebook.html">https://ipython.org/notebook.html</a></p>
</li>
<li>
<p>San Antonio's Hackers Association: <a href="https://satxhackers.org/wp/">https://satxhackers.org/wp/</a></p>
</li>
<li>
<p>MC OHM-I: <a href="https://www.mcohmi.com">https://www.mcohmi.com</a></p>
</li>
<li>Intro Music: Cascadia by Trash80 - <a href="https://trash80.com/#/content/133/weeklybeats-2012-week5">https://trash80.com/#/content/133/weeklybeats-2012-week5</a> (Released under Creative Commons)</li>
<li>Outro Music: <a href="https://soundcloud.com/mc-ohm-i/domain">https://soundcloud.com/mc-ohm-i/domain</a></li>
</ul><br/>
<p><strong>Getting Into Infosec</strong></p>
<ul>
<li>
<p>Twitter: <a href="https://twitter.com/coffeewithayman">https://twitter.com/coffeewithayman</a></p>
</li>
<li>
<p>YouTube: <a href="https://www.youtube.com/channel/UCg6gV_gdfc188HZdN8LUx4A">https://www.youtube.com/channel/UCg6gV_gdfc188HZdN8LUx4A</a></p>
</li>
<li>
<p>Book: <a href="https://www.amazon.com/Breaking-Step-Step-Starting-Information-ebook/dp/B07N15GTPC/">https://www.amazon.com/Breaking-Step-Step-Starting-Information-ebook/dp/B07N15GTPC/</a></p>
</li>
</ul><br/><p>See <a href="https://omnystudio.com/listener">omnystudio.com/listener</a> for privacy information.</p><p>Mentioned in this episode:</p><p><a href="https://getting-into-infosec.captivate.fm/stayintouch">Stay In Touch</a></p>]]></content:encoded><link><![CDATA[https://getting-into-infosec.captivate.fm/episode/leron-gray-from-navy-e6-to-pentester-sans-mentor-and-nerdcore-rapper]]></link><guid isPermaLink="false">4ff46ea2-df0c-4486-bfe6-19c87c7a4fa6</guid><itunes:image href="https://artwork.captivate.fm/331b5549-56a4-4761-8a1a-102180288758/image.jpg"/><dc:creator><![CDATA[Ayman Elsawah (@coffeewithayman)]]></dc:creator><pubDate>Fri, 12 Apr 2019 23:49:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/2457c1c0-55f9-4a83-b2c9-de08cb52abb5/audio.mp3" length="36764453" type="audio/mpeg"/><itunes:duration>38:18</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>20</itunes:episode><podcast:episode>20</podcast:episode><itunes:summary>Leron Gray is a man of many talents. Not getting really into computers until much later in life, but always having a creative side, he now finds himself as a pentester working from home and nerdcore rapper producing amazing beats!</itunes:summary><itunes:author>Ayman Elsawah (@coffeewithayman)</itunes:author></item><item><title>Jared Folkins - 18 YRO Manager To Education Security To Human Hero</title><itunes:title>Jared Folkins - 18 YRO Manager To Education Security To Human Hero</itunes:title><description><![CDATA[<p>Jared Folkins understands people, technology, and the world around him. He can smell a toxic environment from a mile away and has used that EIQ spider-sense for good. Jared shares with us some VERY personal stories (tear-jerker warning!) in integrity and life decisions as well a bunch of on-the-job war stories, including a famous one featured in the news! This is probably my most dramatic episode yet.</p>
<p><strong>Notes:</strong></p>
<ul>
<li>
<p>At 18, he got promoted to manage a team of 50 because he wasn't lazy.</p>
</li>
<li>
<p>In hindsight, he was able to see indicators of the dot com crash but didn't realize that</p>
</li>
<li>
<p>Had a fork in the road where he had a major decision to make</p>
</li>
<li>
<p>Jared shares a VERY personal story with us and the life lesson from that which he applies in his professional life</p>
</li>
<li>
<p>Having a low tolerance for toxic relationships, Jared has been able to sense toxicity, and it's been a driving force for good for him</p>
</li>
</ul><br/>
<p><strong>Quotes:</strong></p>
<ul>
<li>
<p>"I believe in the power of admitting when you're wrong."</p>
</li>
<li>
<p>"I carry my guilt between my shoulder blades."</p>
</li>
<li>
<p>"When I make that mistake; When you have a team that you can trust or a team that honors you, you have the freedom to say stuff like that."</p>
</li>
<li>
<p>"You can only control you."</p>
</li>
<li>
<p>"Constraints can be healthy."</p>
</li>
<li>
<p>"Stepping outside of your comfort zone... [can be] super healthy too."</p>
</li>
<li>
<p>"If someone tells me this person... is not a good person, I'll actually go meet that person. I want to assess it for myself."</p>
</li>
<li>
<p>"[When] you get rejected, don't get super emotional... just work with what you have and move on."</p>
</li>
</ul><br/>
<p><strong>Links:</strong></p>
<ul>
<li>Jared's Blog: <a href="https://www.acloudtree.com">https://www.acloudtree.com</a></li>
<li>Jared's Twitter: <a href="https://twitter.com/jf0lkins">https://twitter.com/jf0lkins</a></li>
<li>Jared's GitHub: <a href="https://github.com/jaredfolkins">https://github.com/jaredfolkins</a></li>
<li>Opsec Edu: <a href="https://www.opsecedu.com">https://www.opsecedu.com</a></li>
<li>KayPro Computer: <a href="http://oldcomputers.net/kayproii.html">http://oldcomputers.net/kayproii.html</a></li>
<li>Donkey Kong Clone: <a href="https://ostermiller.org/ladder/">https://ostermiller.org/ladder/</a></li>
<li>Grand Mal Seizure: <a href="https://www.mayoclinic.org/diseases-conditions/grand-mal-seizure/symptoms-causes/syc-20363458">https://www.mayoclinic.org/diseases-conditions/grand-mal-seizure/symptoms-causes/syc-20363458</a></li>
<li>Project Dir Fu: <a href="https://www.dir-fu.com/">https://www.dir-fu.com/</a></li>
<li>TorHound: <a href="https://github.com/jaredfolkins/torhound">https://github.com/jaredfolkins/torhound</a></li>
</ul><br/>
<p><strong>Getting Into Infosec:</strong></p>
<ul>
<li>Twitter: <a href="https://twitter.com/coffeewithayman">https://twitter.com/coffeewithayman</a></li>
<li>YouTube: <a href="https://www.youtube.com/channel/UCg6gV_gdfc188HZdN8LUx4A">https://www.youtube.com/channel/UCg6gV_gdfc188HZdN8LUx4A</a></li>
<li>Book: <a href="https://www.amazon.com/Breaking-Step-Step-Starting-Information-ebook/dp/B07N15GTPC/">https://www.amazon.com/Breaking-Step-Step-Starting-Information-ebook/dp/B07N15GTPC/</a></li>
</ul><br/><p>See <a href="https://omnystudio.com/listener">omnystudio.com/listener</a> for privacy information.</p><p>Mentioned in this episode:</p><p><a href="https://getting-into-infosec.captivate.fm/stayintouch">Stay In Touch</a></p>]]></description><content:encoded><![CDATA[<p>Jared Folkins understands people, technology, and the world around him. He can smell a toxic environment from a mile away and has used that EIQ spider-sense for good. Jared shares with us some VERY personal stories (tear-jerker warning!) in integrity and life decisions as well a bunch of on-the-job war stories, including a famous one featured in the news! This is probably my most dramatic episode yet.</p>
<p><strong>Notes:</strong></p>
<ul>
<li>
<p>At 18, he got promoted to manage a team of 50 because he wasn't lazy.</p>
</li>
<li>
<p>In hindsight, he was able to see indicators of the dot com crash but didn't realize that</p>
</li>
<li>
<p>Had a fork in the road where he had a major decision to make</p>
</li>
<li>
<p>Jared shares a VERY personal story with us and the life lesson from that which he applies in his professional life</p>
</li>
<li>
<p>Having a low tolerance for toxic relationships, Jared has been able to sense toxicity, and it's been a driving force for good for him</p>
</li>
</ul><br/>
<p><strong>Quotes:</strong></p>
<ul>
<li>
<p>"I believe in the power of admitting when you're wrong."</p>
</li>
<li>
<p>"I carry my guilt between my shoulder blades."</p>
</li>
<li>
<p>"When I make that mistake; When you have a team that you can trust or a team that honors you, you have the freedom to say stuff like that."</p>
</li>
<li>
<p>"You can only control you."</p>
</li>
<li>
<p>"Constraints can be healthy."</p>
</li>
<li>
<p>"Stepping outside of your comfort zone... [can be] super healthy too."</p>
</li>
<li>
<p>"If someone tells me this person... is not a good person, I'll actually go meet that person. I want to assess it for myself."</p>
</li>
<li>
<p>"[When] you get rejected, don't get super emotional... just work with what you have and move on."</p>
</li>
</ul><br/>
<p><strong>Links:</strong></p>
<ul>
<li>Jared's Blog: <a href="https://www.acloudtree.com">https://www.acloudtree.com</a></li>
<li>Jared's Twitter: <a href="https://twitter.com/jf0lkins">https://twitter.com/jf0lkins</a></li>
<li>Jared's GitHub: <a href="https://github.com/jaredfolkins">https://github.com/jaredfolkins</a></li>
<li>Opsec Edu: <a href="https://www.opsecedu.com">https://www.opsecedu.com</a></li>
<li>KayPro Computer: <a href="http://oldcomputers.net/kayproii.html">http://oldcomputers.net/kayproii.html</a></li>
<li>Donkey Kong Clone: <a href="https://ostermiller.org/ladder/">https://ostermiller.org/ladder/</a></li>
<li>Grand Mal Seizure: <a href="https://www.mayoclinic.org/diseases-conditions/grand-mal-seizure/symptoms-causes/syc-20363458">https://www.mayoclinic.org/diseases-conditions/grand-mal-seizure/symptoms-causes/syc-20363458</a></li>
<li>Project Dir Fu: <a href="https://www.dir-fu.com/">https://www.dir-fu.com/</a></li>
<li>TorHound: <a href="https://github.com/jaredfolkins/torhound">https://github.com/jaredfolkins/torhound</a></li>
</ul><br/>
<p><strong>Getting Into Infosec:</strong></p>
<ul>
<li>Twitter: <a href="https://twitter.com/coffeewithayman">https://twitter.com/coffeewithayman</a></li>
<li>YouTube: <a href="https://www.youtube.com/channel/UCg6gV_gdfc188HZdN8LUx4A">https://www.youtube.com/channel/UCg6gV_gdfc188HZdN8LUx4A</a></li>
<li>Book: <a href="https://www.amazon.com/Breaking-Step-Step-Starting-Information-ebook/dp/B07N15GTPC/">https://www.amazon.com/Breaking-Step-Step-Starting-Information-ebook/dp/B07N15GTPC/</a></li>
</ul><br/><p>See <a href="https://omnystudio.com/listener">omnystudio.com/listener</a> for privacy information.</p><p>Mentioned in this episode:</p><p><a href="https://getting-into-infosec.captivate.fm/stayintouch">Stay In Touch</a></p>]]></content:encoded><link><![CDATA[https://getting-into-infosec.captivate.fm/episode/jared-folkins-18-yro-manager-to-education-security-to-human-hero]]></link><guid isPermaLink="false">0873b6ba-6c3e-4f40-9174-3ba554a3db14</guid><itunes:image href="https://artwork.captivate.fm/77d9792c-4cd8-43e6-8c39-eb6209193739/image.jpg"/><dc:creator><![CDATA[Ayman Elsawah (@coffeewithayman)]]></dc:creator><pubDate>Wed, 03 Apr 2019 05:49:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/bf5634f4-1c6f-4073-8b4a-92bf7c009394/audio.mp3" length="52376059" type="audio/mpeg"/><itunes:duration>54:33</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>19</itunes:episode><podcast:episode>19</podcast:episode><itunes:summary>Jared Folkins understands people, technology, and the world around him. He can smell a toxic environment from a mile away and has used that EIQ spider sense for good.</itunes:summary><itunes:author>Ayman Elsawah (@coffeewithayman)</itunes:author></item><item><title>Masha Sedova - From Generations of CS to Behavioral Science and Entrepreneurship</title><itunes:title>Masha Sedova - From Generations of CS to Behavioral Science and Entrepreneurship</itunes:title><description><![CDATA[<p>Masha Sedova comes from a history of computer scientists! Her grandmother was in the first Computer Science graduating class in 1954 under Stalin in the Soviet Union! She loves challenges and is now utilizing what she thought was a waste of time in Liberal Arts to conquer challenges in Information Security using behavioral science, emotional intelligence, and other human factors.</p>
<p><strong>BIO</strong></p>
<p>Masha Sedova is an industry-recognized people-security expert, speaker, and trainer focused on engaging people to be key elements of secure organizations. She is the co-founder of Elevate Security, delivering the first people-centric security platform that leverages behavioral-science to transform employees into security superhumans. Before Elevate, Masha Sedova was a security executive at Salesforce where she built and led the security engagement team focused on improving the security mindset of employees, partners, and customers. In addition, Masha has been a member of the Board of Directors for the National Cyber Security Alliance, and a regular presenter at conferences such as Black Hat, RSA, ISSA, Enigma, and SANS.</p>
<p><strong>Notes</strong></p>
<ul>
<li>
<p>Grandmother was in the first Computer Science graduating class in 1954 under Stalin in the Soviet Union!!</p>
</li>
<li>
<p>Her Grandma taught her dad and her dad taught her programming around the 6th grade.</p>
</li>
<li>
<p>Had access to a computer only through the local University.</p>
</li>
<li>
<p>Masha began her search into 3 disciplines</p>
<ul>
<li>Game Theory</li>
<li>Positive Psychology</li>
<li>Behavioral Science</li>
</ul><br/>
</li>
<li>
<p>Leaderboards are better for only a small subset</p>
</li>
</ul><br/>
<p><strong>Quotes</strong></p>
<ul>
<li>
<p>"You can't patch a human being."</p>
</li>
<li>
<p>"We've taken a technology solution to a human problem, and I think that's totally wrong way of going about it."</p>
</li>
<li>
<p>"Without the human interaction we would not have been able to get that alert."</p>
</li>
<li>
<p>"Focus on failure as an eventual outcome."</p>
</li>
<li>
<p>"I like picking hard challenges and very tall mountains to climb and computer science seemed like a tall mountain."</p>
</li>
<li>
<p>"If you give people the correct amount of challenge, that is a state of happiness."</p>
</li>
<li>
<p>"I found that leaderboards are effective for a small subset of people."</p>
</li>
<li>
<p>"The reasons people don't do things is not because they don't know."</p>
</li>
</ul><br/>
<p><strong>Links</strong></p>
<ul>
<li>
<p>6:1 Positive Feedback Ratio for Performance: <a href="https://medium.com/@Praiseworthy/harvard-research-finds-employees-need-a-6-1-positive-feedback-ratio-to-perform-their-best-8f14160a8fbd">https://medium.com/@Praiseworthy/harvard-research-finds-employees-need-a-6-1-positive-feedback-ratio-to-perform-their-best-8f14160a8fbd</a></p>
</li>
<li>
<p>Dr. Gottman: <a href="https://en.wikipedia.org/wiki/John_Gottman">https://en.wikipedia.org/wiki/John_Gottman</a></p>
</li>
<li>
<p><em>Reality is Broken</em> by Jane McGonigal: <a href="https://www.amazon.com/Reality-Broken-Games-Better-Change/dp/0143120611">https://www.amazon.com/Reality-Broken-Games-Better-Change/dp/0143120611</a></p>
</li>
<li>
<p><em>Flow</em> by Mihaly Csikszentmihalyi: <a href="https://www.amazon.com/Flow-Psychology-Experience-Perennial-Classics/dp/0061339202/">https://www.amazon.com/Flow-Psychology-Experience-Perennial-Classics/dp/0061339202/</a></p>
</li>
<li>
<p>BJ Fogg: <a href="https://www.bjfogg.com/">https://www.bjfogg.com/</a></p>
</li>
<li>
<p>Opower Report: <a href="https://www.povertyactionlab.org/evaluation/opower-evaluating-impact-home-energy-reports-energy-conservation-united-states">https://www.povertyactionlab.org/evaluation/opower-evaluating-impact-home-energy-reports-energy-conservation-united-states</a></p>
</li>
<li>
<p>Predictably Irrational by Dan...]]></description><content:encoded><![CDATA[<p>Masha Sedova comes from a history of computer scientists! Her grandmother was in the first Computer Science graduating class in 1954 under Stalin in the Soviet Union! She loves challenges and is now utilizing what she thought was a waste of time in Liberal Arts to conquer challenges in Information Security using behavioral science, emotional intelligence, and other human factors.</p>
<p><strong>BIO</strong></p>
<p>Masha Sedova is an industry-recognized people-security expert, speaker, and trainer focused on engaging people to be key elements of secure organizations. She is the co-founder of Elevate Security, delivering the first people-centric security platform that leverages behavioral-science to transform employees into security superhumans. Before Elevate, Masha Sedova was a security executive at Salesforce where she built and led the security engagement team focused on improving the security mindset of employees, partners, and customers. In addition, Masha has been a member of the Board of Directors for the National Cyber Security Alliance, and a regular presenter at conferences such as Black Hat, RSA, ISSA, Enigma, and SANS.</p>
<p><strong>Notes</strong></p>
<ul>
<li>
<p>Grandmother was in the first Computer Science graduating class in 1954 under Stalin in the Soviet Union!!</p>
</li>
<li>
<p>Her Grandma taught her dad and her dad taught her programming around the 6th grade.</p>
</li>
<li>
<p>Had access to a computer only through the local University.</p>
</li>
<li>
<p>Masha began her search into 3 disciplines</p>
<ul>
<li>Game Theory</li>
<li>Positive Psychology</li>
<li>Behavioral Science</li>
</ul><br/>
</li>
<li>
<p>Leaderboards are better for only a small subset</p>
</li>
</ul><br/>
<p><strong>Quotes</strong></p>
<ul>
<li>
<p>"You can't patch a human being."</p>
</li>
<li>
<p>"We've taken a technology solution to a human problem, and I think that's totally wrong way of going about it."</p>
</li>
<li>
<p>"Without the human interaction we would not have been able to get that alert."</p>
</li>
<li>
<p>"Focus on failure as an eventual outcome."</p>
</li>
<li>
<p>"I like picking hard challenges and very tall mountains to climb and computer science seemed like a tall mountain."</p>
</li>
<li>
<p>"If you give people the correct amount of challenge, that is a state of happiness."</p>
</li>
<li>
<p>"I found that leaderboards are effective for a small subset of people."</p>
</li>
<li>
<p>"The reasons people don't do things is not because they don't know."</p>
</li>
</ul><br/>
<p><strong>Links</strong></p>
<ul>
<li>
<p>6:1 Positive Feedback Ratio for Performance: <a href="https://medium.com/@Praiseworthy/harvard-research-finds-employees-need-a-6-1-positive-feedback-ratio-to-perform-their-best-8f14160a8fbd">https://medium.com/@Praiseworthy/harvard-research-finds-employees-need-a-6-1-positive-feedback-ratio-to-perform-their-best-8f14160a8fbd</a></p>
</li>
<li>
<p>Dr. Gottman: <a href="https://en.wikipedia.org/wiki/John_Gottman">https://en.wikipedia.org/wiki/John_Gottman</a></p>
</li>
<li>
<p><em>Reality is Broken</em> by Jane McGonigal: <a href="https://www.amazon.com/Reality-Broken-Games-Better-Change/dp/0143120611">https://www.amazon.com/Reality-Broken-Games-Better-Change/dp/0143120611</a></p>
</li>
<li>
<p><em>Flow</em> by Mihaly Csikszentmihalyi: <a href="https://www.amazon.com/Flow-Psychology-Experience-Perennial-Classics/dp/0061339202/">https://www.amazon.com/Flow-Psychology-Experience-Perennial-Classics/dp/0061339202/</a></p>
</li>
<li>
<p>BJ Fogg: <a href="https://www.bjfogg.com/">https://www.bjfogg.com/</a></p>
</li>
<li>
<p>Opower Report: <a href="https://www.povertyactionlab.org/evaluation/opower-evaluating-impact-home-energy-reports-energy-conservation-united-states">https://www.povertyactionlab.org/evaluation/opower-evaluating-impact-home-energy-reports-energy-conservation-united-states</a></p>
</li>
<li>
<p>Predictably Irrational by Dan Ariely: <a href="https://www.amazon.com/Predictably-Irrational-Hidden-Forces-Decisions/dp/006135323X">https://www.amazon.com/Predictably-Irrational-Hidden-Forces-Decisions/dp/006135323X</a></p>
</li>
<li>
<p>Intro Music (Cascadia by Trash80): <a href="https://trash80.com/#/content/133/weeklybeats-2012-week5">https://trash80.com/#/content/133/weeklybeats-2012-week5</a></p>
</li>
<li>
<p>Outro Music (Quincas Moreira - Entire): <a href="https://www.youtube.com/watch?v=DoKpuXyIyVs">https://www.youtube.com/watch?v=DoKpuXyIyVs</a></p>
</li>
</ul><br/>
<p><strong>Getting Into Infosec</strong></p>
<ul>
<li>Twitter: <a href="https://twitter.com/coffeewithayman">https://twitter.com/coffeewithayman</a></li>
<li>YouTube: <a href="https://www.youtube.com/channel/UCg6gV_gdfc188HZdN8LUx4A">https://www.youtube.com/channel/UCg6gV_gdfc188HZdN8LUx4A</a></li>
<li>Book: <a href="https://www.amazon.com/Breaking-Step-Step-Starting-Information-ebook/dp/B07N15GTPC/">https://www.amazon.com/Breaking-Step-Step-Starting-Information-ebook/dp/B07N15GTPC/</a></li>
</ul><br/><p>See <a href="https://omnystudio.com/listener">omnystudio.com/listener</a> for privacy information.</p><p>Mentioned in this episode:</p><p><a href="https://getting-into-infosec.captivate.fm/stayintouch">Stay In Touch</a></p>]]></content:encoded><link><![CDATA[https://getting-into-infosec.captivate.fm/episode/masha-sedova-from-generations-of-cs-to-behavioral-science-and-entrepreneurship]]></link><guid isPermaLink="false">cd706da3-8a27-4cc1-99c3-5c0b019b4235</guid><itunes:image href="https://artwork.captivate.fm/50112877-8062-4c74-9104-8abaebad2cf0/image.jpg"/><dc:creator><![CDATA[Ayman Elsawah (@coffeewithayman)]]></dc:creator><pubDate>Fri, 22 Mar 2019 19:15:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/82b084fc-35cd-4628-b504-b36ce8ad8a61/audio.mp3" length="44339553" type="audio/mpeg"/><itunes:duration>46:11</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>18</itunes:episode><podcast:episode>18</podcast:episode><itunes:summary>Masha Sedova comes from a history of computer scientists! She loves challenges and is currently tackling the human side of security through data, psychology, and behavioral science.</itunes:summary><itunes:author>Ayman Elsawah (@coffeewithayman)</itunes:author></item><item><title>BONUS - InfosecJon Learns Trust But Verify The HARD way</title><itunes:title>BONUS - InfosecJon Learns Trust But Verify The HARD way</itunes:title><description><![CDATA[<p>InfosecJon expands on some CRAZY follies he experienced during his times in the Navy. He learns through trial by fire, literally: trust but verify!</p>
<p><strong>Notes</strong></p>
<ul>
<li>
<p>Jon almost gets crushed inside the engine of Naval ship</p>
</li>
<li>
<p>A boiler exploded and Jon, a jr. engineer, was left in charge of the situation and had to give orders</p>
</li>
<li>
<p>Jon got soaked with engine Oil on a running ship, resulting in the loss of pitch-control</p>
</li>
<li>
<p>Luckily, Jon was wearing a PEP suit</p>
</li>
<li>
<p>Tag-out manual: <a href="https://www.public.navy.mil/NAVSAFECEN/Documents/afloat/Surface/Rsrcs/References/TUM_REV_07.pdf">https://www.public.navy.mil/NAVSAFECEN/Documents/afloat/Surface/Rsrcs/References/TUM_REV_07.pdf</a></p>
</li>
</ul><br/>
<p><strong>Getting Into Infosec</strong></p>
<ul>
<li>Twitter: <a href="https://twitter.com/coffeewithayman">https://twitter.com/coffeewithayman</a></li>
<li>YouTube: <a href="https://www.youtube.com/channel/UCg6gV_gdfc188HZdN8LUx4A">https://www.youtube.com/channel/UCg6gV_gdfc188HZdN8LUx4A</a></li>
<li>Book: <a href="https://www.amazon.com/Breaking-Step-Step-Starting-Information-ebook/dp/B07N15GTPC/">https://www.amazon.com/Breaking-Step-Step-Starting-Information-ebook/dp/B07N15GTPC/</a></li>
</ul><br/><p>See <a href="https://omnystudio.com/listener">omnystudio.com/listener</a> for privacy information.</p><p>Mentioned in this episode:</p><p><a href="https://getting-into-infosec.captivate.fm/stayintouch">Stay In Touch</a></p>]]></description><content:encoded><![CDATA[<p>InfosecJon expands on some CRAZY follies he experienced during his times in the Navy. He learns through trial by fire, literally: trust but verify!</p>
<p><strong>Notes</strong></p>
<ul>
<li>
<p>Jon almost gets crushed inside the engine of Naval ship</p>
</li>
<li>
<p>A boiler exploded and Jon, a jr. engineer, was left in charge of the situation and had to give orders</p>
</li>
<li>
<p>Jon got soaked with engine Oil on a running ship, resulting in the loss of pitch-control</p>
</li>
<li>
<p>Luckily, Jon was wearing a PEP suit</p>
</li>
<li>
<p>Tag-out manual: <a href="https://www.public.navy.mil/NAVSAFECEN/Documents/afloat/Surface/Rsrcs/References/TUM_REV_07.pdf">https://www.public.navy.mil/NAVSAFECEN/Documents/afloat/Surface/Rsrcs/References/TUM_REV_07.pdf</a></p>
</li>
</ul><br/>
<p><strong>Getting Into Infosec</strong></p>
<ul>
<li>Twitter: <a href="https://twitter.com/coffeewithayman">https://twitter.com/coffeewithayman</a></li>
<li>YouTube: <a href="https://www.youtube.com/channel/UCg6gV_gdfc188HZdN8LUx4A">https://www.youtube.com/channel/UCg6gV_gdfc188HZdN8LUx4A</a></li>
<li>Book: <a href="https://www.amazon.com/Breaking-Step-Step-Starting-Information-ebook/dp/B07N15GTPC/">https://www.amazon.com/Breaking-Step-Step-Starting-Information-ebook/dp/B07N15GTPC/</a></li>
</ul><br/><p>See <a href="https://omnystudio.com/listener">omnystudio.com/listener</a> for privacy information.</p><p>Mentioned in this episode:</p><p><a href="https://getting-into-infosec.captivate.fm/stayintouch">Stay In Touch</a></p>]]></content:encoded><link><![CDATA[https://getting-into-infosec.captivate.fm/episode/bonus-infosecjon-learns-trust-but-verify-the-hard-way]]></link><guid isPermaLink="false">dde4458c-15d3-4a9a-b25d-a119e7b9c23d</guid><itunes:image href="https://artwork.captivate.fm/95ea139b-deda-452f-9820-289bf1a9d097/image.jpg"/><dc:creator><![CDATA[Ayman Elsawah (@coffeewithayman)]]></dc:creator><pubDate>Wed, 20 Mar 2019 22:30:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/b436319d-d6ad-48a5-ad5c-33a3cfc3c3ce/audio.mp3" length="7052971" type="audio/mpeg"/><itunes:duration>07:21</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>bonus</itunes:episodeType><itunes:summary>InfosecJon expands on some CRAZY follies he experienced during his times in the Navy. Many times he comes close to a fatal or catastrophic experience. He learns through trial by fire, literally, to trust but verify!</itunes:summary><itunes:author>Ayman Elsawah (@coffeewithayman)</itunes:author></item><item><title>InfosecJon - From Rudderless Youth to Navy Engineer to Security Professional</title><itunes:title>InfosecJon - From Rudderless Youth to Navy Engineer to Security Professional</itunes:title><description><![CDATA[<p>InfosecJon runs a website cataloging his learning and dedicated to helping others get in the field. He shares his personal story from a directionless youth to enlisting in the Navy (and its follies) and his tribulations getting into the field. He also shares some interesting Navy stories. Look out for the bonus episode!</p>
<p><strong>BIO</strong></p>
<p>Jon is a father, husband, and a veteran. He went from an aimless youth to enlisting into a career path he never liked. After 7 years as an electrical engineer, he got the chance to pursue his dream of working in information security. Now, he runs a website devoted to helping others.</p>
<p><strong>Notes</strong></p>
<ul>
<li>By almost getting crushed in a two-story engine, Jon learned to be adaptable to the situation</li>
<li>Got exposure to computers by working with dad at his computer store</li>
<li>Was an engineer at heart who fell in love with the inner workings of things and how they work</li>
<li>Became the go-to person for technology in his department</li>
<li>Always had a knack for helping others, even before the military</li>
</ul><br/>
<p><strong>Quotes:</strong></p>
<ul>
<li>"[The] biggest skill I got was to be able to figure things out quickly and troubleshooting."</li>
<li>"You can't troubleshoot something until you know how it works."</li>
<li>"I just wanted to learn as much as I could."</li>
<li>"I want to work with technology; I want to help people."</li>
<li>"Going to a traditional school, being more mature, was [seen as] a negative."</li>
<li>"Everybody doesn't know everything. That's why most security teams are... teams!"</li>
<li>"I want to help people; I want to protect people."</li>
<li>"The networking knowledge, the [SysAdmin] knowledge, and then the drive to learn new stuff... is what they were attracted to."</li>
<li>"Nobody wanted to do it. I volunteered and stepped up."</li>
<li>"One thing that attracted me to the school 100% was the advertised hands-on labs."</li>
</ul><br/>
<p><strong>Links</strong></p>
<ul>
<li>InfosecJon (Twitter): <a href="https://twitter.com/infosecjon">https://twitter.com/infosecjon</a></li>
<li>InfosecJon (Website): <a href="https://infosecjon.com/">https://infosecjon.com/</a></li>
<li>Navy C-School: <a href="https://www.quora.com/Whats-a-Navy-C-school">https://www.quora.com/Whats-a-Navy-C-school</a></li>
<li>Jon on the different types of hackers: <a href="https://infosecjon.com/types-of-hackers/">https://infosecjon.com/types-of-hackers/</a></li>
<li>Intro: Cascadia by Trash80: <a href="https://trash80.com/#/content/133/weeklybeats-2012-week5">https://trash80.com/#/content/133/weeklybeats-2012-week5</a></li>
<li>Outro: White Smoke by Endless - <a href="http://www.endlessslove.com/">http://www.endlessslove.com/</a></li>
</ul><br/>
<p><strong>Resources</strong></p>
<ul>
<li>SEED Labs by Syracuse University: <a href="http://www.cis.syr.edu/~wedu/seed/index.html">http://www.cis.syr.edu/~wedu/seed/index.html</a></li>
<li>David's CTF Post: <a href="https://bsidessf.org/news/2019/03/running-the-bsides-sf-2019-ctf">https://bsidessf.org/news/2019/03/running-the-bsides-sf-2019-ctf</a></li>
</ul><br/>
<p><strong>Getting Into Infosec:</strong></p>
<ul>
<li>Twitter: <a href="https://twitter.com/coffeewithayman">https://twitter.com/coffeewithayman</a></li>
<li>YouTube: <a href="https://www.youtube.com/channel/UCg6gV_gdfc188HZdN8LUx4A">https://www.youtube.com/channel/UCg6gV_gdfc188HZdN8LUx4A</a></li>
<li>Book: <a href="https://www.amazon.com/Breaking-Step-Step-Starting-Information-ebook/dp/B07N15GTPC/">https://www.amazon.com/Breaking-Step-Step-Starting-Information-ebook/dp/B07N15GTPC/</a></li>
</ul><br/><p>See <a href="https://omnystudio.com/listener">omnystudio.com/listener</a> for privacy information.</p><p>Mentioned in this episode:</p><p><a href="https://getting-into-infosec.captivate.fm/stayintouch">Stay In Touch</a></p>]]></description><content:encoded><![CDATA[<p>InfosecJon runs a website cataloging his learning and dedicated to helping others get in the field. He shares his personal story from a directionless youth to enlisting in the Navy (and its follies) and his tribulations getting into the field. He also shares some interesting Navy stories. Look out for the bonus episode!</p>
<p><strong>BIO</strong></p>
<p>Jon is a father, husband, and a veteran. He went from an aimless youth to enlisting into a career path he never liked. After 7 years as an electrical engineer, he got the chance to pursue his dream of working in information security. Now, he runs a website devoted to helping others.</p>
<p><strong>Notes</strong></p>
<ul>
<li>By almost getting crushed in a two-story engine, Jon learned to be adaptable to the situation</li>
<li>Got exposure to computers by working with dad at his computer store</li>
<li>Was an engineer at heart who fell in love with the inner workings of things and how they work</li>
<li>Became the go-to person for technology in his department</li>
<li>Always had a knack for helping others, even before the military</li>
</ul><br/>
<p><strong>Quotes:</strong></p>
<ul>
<li>"[The] biggest skill I got was to be able to figure things out quickly and troubleshooting."</li>
<li>"You can't troubleshoot something until you know how it works."</li>
<li>"I just wanted to learn as much as I could."</li>
<li>"I want to work with technology; I want to help people."</li>
<li>"Going to a traditional school, being more mature, was [seen as] a negative."</li>
<li>"Everybody doesn't know everything. That's why most security teams are... teams!"</li>
<li>"I want to help people; I want to protect people."</li>
<li>"The networking knowledge, the [SysAdmin] knowledge, and then the drive to learn new stuff... is what they were attracted to."</li>
<li>"Nobody wanted to do it. I volunteered and stepped up."</li>
<li>"One thing that attracted me to the school 100% was the advertised hands-on labs."</li>
</ul><br/>
<p><strong>Links</strong></p>
<ul>
<li>InfosecJon (Twitter): <a href="https://twitter.com/infosecjon">https://twitter.com/infosecjon</a></li>
<li>InfosecJon (Website): <a href="https://infosecjon.com/">https://infosecjon.com/</a></li>
<li>Navy C-School: <a href="https://www.quora.com/Whats-a-Navy-C-school">https://www.quora.com/Whats-a-Navy-C-school</a></li>
<li>Jon on the different types of hackers: <a href="https://infosecjon.com/types-of-hackers/">https://infosecjon.com/types-of-hackers/</a></li>
<li>Intro: Cascadia by Trash80: <a href="https://trash80.com/#/content/133/weeklybeats-2012-week5">https://trash80.com/#/content/133/weeklybeats-2012-week5</a></li>
<li>Outro: White Smoke by Endless - <a href="http://www.endlessslove.com/">http://www.endlessslove.com/</a></li>
</ul><br/>
<p><strong>Resources</strong></p>
<ul>
<li>SEED Labs by Syracuse University: <a href="http://www.cis.syr.edu/~wedu/seed/index.html">http://www.cis.syr.edu/~wedu/seed/index.html</a></li>
<li>David's CTF Post: <a href="https://bsidessf.org/news/2019/03/running-the-bsides-sf-2019-ctf">https://bsidessf.org/news/2019/03/running-the-bsides-sf-2019-ctf</a></li>
</ul><br/>
<p><strong>Getting Into Infosec:</strong></p>
<ul>
<li>Twitter: <a href="https://twitter.com/coffeewithayman">https://twitter.com/coffeewithayman</a></li>
<li>YouTube: <a href="https://www.youtube.com/channel/UCg6gV_gdfc188HZdN8LUx4A">https://www.youtube.com/channel/UCg6gV_gdfc188HZdN8LUx4A</a></li>
<li>Book: <a href="https://www.amazon.com/Breaking-Step-Step-Starting-Information-ebook/dp/B07N15GTPC/">https://www.amazon.com/Breaking-Step-Step-Starting-Information-ebook/dp/B07N15GTPC/</a></li>
</ul><br/><p>See <a href="https://omnystudio.com/listener">omnystudio.com/listener</a> for privacy information.</p><p>Mentioned in this episode:</p><p><a href="https://getting-into-infosec.captivate.fm/stayintouch">Stay In Touch</a></p>]]></content:encoded><link><![CDATA[https://getting-into-infosec.captivate.fm/episode/infosecjon-from-rudderless-youth-to-navy-engineer-to-security-professional]]></link><guid isPermaLink="false">d1460296-f5c5-47a3-aafb-19d33a65f24f</guid><itunes:image href="https://artwork.captivate.fm/99f7b2cf-e3c4-4e04-ab45-7d296397868b/image.jpg"/><dc:creator><![CDATA[Ayman Elsawah (@coffeewithayman)]]></dc:creator><pubDate>Sat, 16 Mar 2019 00:24:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/df00ffec-6a12-4633-97f7-eed09471a7da/audio.mp3" length="43888571" type="audio/mpeg"/><itunes:duration>45:43</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>17</itunes:episode><podcast:episode>17</podcast:episode><itunes:summary>InfosecJon runs a website cataloging his learning and dedicated to helping others get in the field. He shares his personal story from a directionless youth to enlisting in the Navy (and it&apos;s follies) and his tribulations getting into the field.</itunes:summary><itunes:author>Ayman Elsawah (@coffeewithayman)</itunes:author></item><item><title>InfosecSherpa - From Travel Agent to Law Librarian to Security Analyst!</title><itunes:title>InfosecSherpa - From Travel Agent to Law Librarian to Security Analyst!</itunes:title><description><![CDATA[<p>Tracy Maleeff (@InfosecSherpa) was a professional law librarian and at the top of her game. Looking for change and meaning, she searched until she found the field of Information Security. This is her journey.</p>
<p><strong>BIO</strong></p>
<p>Tracy Z. Maleeff (/may-leaf/), <a href="https://twitter.com/infosecsherpa">@InfoSecSherpa</a>, is an independent information professional providing research and social media consulting with a focus on information security. She is a frequent presenter on best practices of data mining from social media, professional networking, and introduction to information security topics. Tracy has 15 years of experience as a librarian in academia, corporate, and law firm industries and earned a Master of Library and Information Science from the University of Pittsburgh. She is the Principal of Sherpa Intelligence LLC&ndash;your guide up a mountain of information.</p>
<p><strong>Notes</strong></p>
<ul>
<li>
<p>There is a condition called the "Librarian Face"</p>
</li>
<li>
<p>Librarians who have a Master's Degree in Library Science are taught to be approachable</p>
</li>
<li>
<p>Was never a public librarian; she worked in "special" libraries. This made her really good at finding and accessing data</p>
</li>
<li>
<p>Tracy shares some social engineering tricks she did earlier in her life</p>
</li>
<li>
<p>Didn't grow up with computers around her</p>
</li>
<li>
<p>Advice: "Know yourself"</p>
</li>
</ul><br/>
<p><strong>Quotes</strong></p>
<ul>
<li>
<p>"If you are out in public&hellip; people are likely [going] to come ask you questions because you look like you know things."</p>
</li>
<li>
<p>"I did fail, but I did not fail as badly as I thought I would!"</p>
</li>
<li>
<p>"I don't regret the path that I took."</p>
</li>
<li>
<p>"For someone like me who does come from a technical background... having the certifications is what people want to see."</p>
</li>
<li>
<p>"They need to see some receipt!"</p>
</li>
<li>
<p>"Even if it turned out to be nothing, don't be afraid to speak up."</p>
</li>
<li>
<p>"I don't think I realized it was social engineering;&nbsp; I just knew it was something that I wanted."</p>
</li>
<li>
<p>"Managed to talk my way not only on the plane, but also into business first."</p>
</li>
<li>
<p>"They had me at port scanning."</p>
</li>
</ul><br/>
<p><strong>Links</strong></p>
<ul>
<li>
<p>Infosecsherpa: <a href="https://twitter.com/infosecsherpa">https://twitter.com/infosecsherpa</a></p>
</li>
<li>
<p>Women&rsquo;s Society of Cyberjutsu (WSC): <a href="https://womenscyberjutsu.org/">https://womenscyberjutsu.org/</a></p>
</li>
<li>
<p>Intro Music: Cascadia by Trash80 - <a href="https://trash80.com/#/content/133/weeklybeats-2012-week5">https://trash80.com/#/content/133/weeklybeats-2012-week5</a></p>
</li>
<li>
<p>Outro Music: JR Tundra - Natty Roadster</p>
</li>
</ul><br/>
<p><strong>Resources</strong></p>
<ul>
<li>Art of Improvement: <a href="https://www.youtube.com/channel/UCtYzVCmNxrshH4_bPO_-Y-A">https://www.youtube.com/channel/UCtYzVCmNxrshH4_bPO_-Y-A</a></li>
</ul><br/>
<p><strong>Getting Into Infosec</strong></p>
<ul>
<li>Twitter: <a href="https://twitter.com/coffeewithayman">https://twitter.com/coffeewithayman</a></li>
<li>YouTube: <a href="https://www.youtube.com/channel/UCg6gV_gdfc188HZdN8LUx4A">https://www.youtube.com/channel/UCg6gV_gdfc188HZdN8LUx4A</a></li>
<li>Book:<a href="https://www.amazon.com/Breaking-Step-Step-Starting-Information-ebook/dp/B07N15GTPC/"> https://www.amazon.com/Breaking-Step-Step-Starting-Information-ebook/dp/B07N15GTPC/</a></li>
</ul><br/><p>See <a href="https://omnystudio.com/listener">omnystudio.com/listener</a> for privacy information.</p><p>Mentioned in this episode:</p><p><a href="https://getting-into-infosec.captivate.fm/stayintouch">Stay In Touch</a></p>]]></description><content:encoded><![CDATA[<p>Tracy Maleeff (@InfosecSherpa) was a professional law librarian and at the top of her game. Looking for change and meaning, she searched until she found the field of Information Security. This is her journey.</p>
<p><strong>BIO</strong></p>
<p>Tracy Z. Maleeff (/may-leaf/), <a href="https://twitter.com/infosecsherpa">@InfoSecSherpa</a>, is an independent information professional providing research and social media consulting with a focus on information security. She is a frequent presenter on best practices of data mining from social media, professional networking, and introduction to information security topics. Tracy has 15 years of experience as a librarian in academia, corporate, and law firm industries and earned a Master of Library and Information Science from the University of Pittsburgh. She is the Principal of Sherpa Intelligence LLC&ndash;your guide up a mountain of information.</p>
<p><strong>Notes</strong></p>
<ul>
<li>
<p>There is a condition called the "Librarian Face"</p>
</li>
<li>
<p>Librarians who have a Master's Degree in Library Science are taught to be approachable</p>
</li>
<li>
<p>Was never a public librarian; she worked in "special" libraries. This made her really good at finding and accessing data</p>
</li>
<li>
<p>Tracy shares some social engineering tricks she did earlier in her life</p>
</li>
<li>
<p>Didn't grow up with computers around her</p>
</li>
<li>
<p>Advice: "Know yourself"</p>
</li>
</ul><br/>
<p><strong>Quotes</strong></p>
<ul>
<li>
<p>"If you are out in public&hellip; people are likely [going] to come ask you questions because you look like you know things."</p>
</li>
<li>
<p>"I did fail, but I did not fail as badly as I thought I would!"</p>
</li>
<li>
<p>"I don't regret the path that I took."</p>
</li>
<li>
<p>"For someone like me who does come from a technical background... having the certifications is what people want to see."</p>
</li>
<li>
<p>"They need to see some receipt!"</p>
</li>
<li>
<p>"Even if it turned out to be nothing, don't be afraid to speak up."</p>
</li>
<li>
<p>"I don't think I realized it was social engineering;&nbsp; I just knew it was something that I wanted."</p>
</li>
<li>
<p>"Managed to talk my way not only on the plane, but also into business first."</p>
</li>
<li>
<p>"They had me at port scanning."</p>
</li>
</ul><br/>
<p><strong>Links</strong></p>
<ul>
<li>
<p>Infosecsherpa: <a href="https://twitter.com/infosecsherpa">https://twitter.com/infosecsherpa</a></p>
</li>
<li>
<p>Women&rsquo;s Society of Cyberjutsu (WSC): <a href="https://womenscyberjutsu.org/">https://womenscyberjutsu.org/</a></p>
</li>
<li>
<p>Intro Music: Cascadia by Trash80 - <a href="https://trash80.com/#/content/133/weeklybeats-2012-week5">https://trash80.com/#/content/133/weeklybeats-2012-week5</a></p>
</li>
<li>
<p>Outro Music: JR Tundra - Natty Roadster</p>
</li>
</ul><br/>
<p><strong>Resources</strong></p>
<ul>
<li>Art of Improvement: <a href="https://www.youtube.com/channel/UCtYzVCmNxrshH4_bPO_-Y-A">https://www.youtube.com/channel/UCtYzVCmNxrshH4_bPO_-Y-A</a></li>
</ul><br/>
<p><strong>Getting Into Infosec</strong></p>
<ul>
<li>Twitter: <a href="https://twitter.com/coffeewithayman">https://twitter.com/coffeewithayman</a></li>
<li>YouTube: <a href="https://www.youtube.com/channel/UCg6gV_gdfc188HZdN8LUx4A">https://www.youtube.com/channel/UCg6gV_gdfc188HZdN8LUx4A</a></li>
<li>Book:<a href="https://www.amazon.com/Breaking-Step-Step-Starting-Information-ebook/dp/B07N15GTPC/"> https://www.amazon.com/Breaking-Step-Step-Starting-Information-ebook/dp/B07N15GTPC/</a></li>
</ul><br/><p>See <a href="https://omnystudio.com/listener">omnystudio.com/listener</a> for privacy information.</p><p>Mentioned in this episode:</p><p><a href="https://getting-into-infosec.captivate.fm/stayintouch">Stay In Touch</a></p>]]></content:encoded><link><![CDATA[https://getting-into-infosec.captivate.fm/episode/infosecsherpa-from-travel-agent-to-law-librarian-to-security-analyst]]></link><guid isPermaLink="false">46e9e457-fd84-48fe-8bfa-4c1be004be69</guid><itunes:image href="https://artwork.captivate.fm/51a9575a-997b-4866-b852-5ea977b7d672/image.jpg"/><dc:creator><![CDATA[Ayman Elsawah (@coffeewithayman)]]></dc:creator><pubDate>Fri, 01 Mar 2019 08:05:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/8972b618-0b52-4f6b-b8c1-dc3c73ff4990/audio.mp3" length="42847012" type="audio/mpeg"/><itunes:duration>44:38</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>16</itunes:episode><podcast:episode>16</podcast:episode><itunes:summary>Little does the Information Security community know, but among us are experts at OSINT. They lurk behind friendly faces, waiting to be asked questions. They are librarians!</itunes:summary><itunes:author>Ayman Elsawah (@coffeewithayman)</itunes:author></item><item><title>Adrian Kaylor - From Network Admin to Trainer to Sales Engineer for Life</title><itunes:title>Adrian Kaylor - From Network Admin to Trainer to Sales Engineer for Life</itunes:title><description><![CDATA[<p>Adrian is a Sr. Sales Engineer at Splunk who focuses on security. He has worked for various security startups in the Bay Area for the past 15 years from vulnerability management to endpoint investigation to ML-based threat hunting.</p>
<p><strong>Notes:</strong></p>
<ul>
<li>
<p>Had an interest in security early on, starting with opening binaries on Sierra King's quest games and looking for hints.</p>
</li>
<li>
<p>Took any opportunity he got to get exposed to security</p>
</li>
<li>
<p>His job as an instructor was very useful during support and later as a sales engineer</p>
</li>
<li>
<p>Keeps a Trello board for his lab!</p>
</li>
<li>
<p>Adrian expenses (deducts) what he spends on his lab from his taxes (consult a tax attorney)</p>
</li>
<li>
<p>He mentions an awesome hack for installing Kali on a Chromebook (~22 mins)</p>
</li>
</ul><br/>
<p><strong>Quotes:</strong></p>
<ul>
<li>
<p>"I remember the first time I found Phrack, my mind exploded a little bit."</p>
</li>
<li>
<p>"Experience is experience: everything that you use (skills) will get used later on."</p>
</li>
<li>
<p>"Figure out what pieces they're missing, so you can fill them in."</p>
</li>
<li>
<p>"Go through the CIS top 20 critical controls."</p>
</li>
<li>
<p>"Be less focused on the whizbang fun stuff, and more focused to get you the most return."</p>
</li>
</ul><br/>
<p><strong>Links:</strong></p>
<p>Please thank my guests for sharing their time with us and let them know if this episode helped you.</p>
<ul>
<li>Adrian Kaylor on Twitter: <a href="https://twitter.com/AdrianKaylor">https://twitter.com/AdrianKaylor</a></li>
<li>Adrian Kaylor on LinkedIn: <a href="https://www.linkedin.com/in/adriankaylor/">https://www.linkedin.com/in/adriankaylor/</a></li>
<li>Phrack Magazine: <a href="http://www.phrack.org/">http://www.phrack.org/</a></li>
<li>Lack Rack: <a href="https://www.google.com/search?q=ikea+lack+rack&amp;source=lnms">https://www.google.com/search?q=ikea+lack+rack&amp;source=lnms</a></li>
<li>ISS: <a href="https://www-03.ibm.com/press/us/en/pressrelease/20468.wss">https://www-03.ibm.com/press/us/en/pressrelease/20468.wss</a></li>
<li>Splunk Dev License: <a href="http://dev.splunk.com/">http://dev.splunk.com/</a></li>
<li>CIS 20 Controls: <a href="https://en.wikipedia.org/wiki/The_CIS_Critical_Security_Controls_for_Effective_Cyber_Defense">https://en.wikipedia.org/wiki/The_CIS_Critical_Security_Controls_for_Effective_Cyber_Defense</a></li>
<li>JA3: <a href="https://github.com/salesforce/ja3">https://github.com/salesforce/ja3</a></li>
<li>Irongeek: <a href="http://www.irongeek.com/">http://www.irongeek.com/</a></li>
<li>Netsec Reddit: <a href="https://reddit.com/r/netsec">https://reddit.com/r/netsec</a></li>
<li>SANS Holiday Hack Challenge: <a href="https://www.holidayhackchallenge.com/2018/">https://www.holidayhackchallenge.com/2018/</a></li>
<li>Garage Door Hack by Samy Kamkar: <a href="http://samy.pl/opensesame/">http://samy.pl/opensesame/</a></li>
<li>Sam Bowne's Class: <a href="https://samsclass.info">https://samsclass.info</a></li>
<li>Adrian's Presentation on YouTube: <a href="https://www.youtube.com/watch?v=8LF96Oq_pgo">https://www.youtube.com/watch?v=8LF96Oq_pgo</a> (Picture of lab at 24:05)</li>
<li>Intro Music by Trash80</li>
<li>Outro Music (Liberation Theology - Exploitation is Sin):<br><a href="https://open.spotify.com/album/0oc93ZsbMluxL8H994U9MW">https://open.spotify.com/album/0oc93ZsbMluxL8H994U9MW</a></li>
</ul><br/>
<p><strong>Learning Resource Mentioned:</strong></p>
<ul>
<li><a href="https://www.youtube.com/watch?v=6MYF6Zo6i6A">https://www.youtube.com/watch?v=6MYF6Zo6i6A</a> (based on <a href="https://www.coursera.org/learn/it-security">https://www.coursera.org/learn/it-security</a>)</li>
</ul><br/>
<p><strong>Getting Into Infosec:</strong></p>
<ul>
<li>Twitter: <a href="https://twitter.com/coffeewithayman">https://twitter.com/coffeewithayman</a></li>
<li>YouTube:...]]></description><content:encoded><![CDATA[<p>Adrian is a Sr. Sales Engineer at Splunk who focuses on security. He has worked for various security startups in the Bay Area for the past 15 years from vulnerability management to endpoint investigation to ML-based threat hunting.</p>
<p><strong>Notes:</strong></p>
<ul>
<li>
<p>Had an interest in security early on, starting with opening binaries on Sierra King's quest games and looking for hints.</p>
</li>
<li>
<p>Took any opportunity he got to get exposed to security</p>
</li>
<li>
<p>His job as an instructor was very useful during support and later as a sales engineer</p>
</li>
<li>
<p>Keeps a Trello board for his lab!</p>
</li>
<li>
<p>Adrian expenses (deducts) what he spends on his lab from his taxes (consult a tax attorney)</p>
</li>
<li>
<p>He mentions an awesome hack for installing Kali on a Chromebook (~22 mins)</p>
</li>
</ul><br/>
<p><strong>Quotes:</strong></p>
<ul>
<li>
<p>"I remember the first time I found Phrack, my mind exploded a little bit."</p>
</li>
<li>
<p>"Experience is experience: everything that you use (skills) will get used later on."</p>
</li>
<li>
<p>"Figure out what pieces they're missing, so you can fill them in."</p>
</li>
<li>
<p>"Go through the CIS top 20 critical controls."</p>
</li>
<li>
<p>"Be less focused on the whizbang fun stuff, and more focused to get you the most return."</p>
</li>
</ul><br/>
<p><strong>Links:</strong></p>
<p>Please thank my guests for sharing their time with us and let them know if this episode helped you.</p>
<ul>
<li>Adrian Kaylor on Twitter: <a href="https://twitter.com/AdrianKaylor">https://twitter.com/AdrianKaylor</a></li>
<li>Adrian Kaylor on LinkedIn: <a href="https://www.linkedin.com/in/adriankaylor/">https://www.linkedin.com/in/adriankaylor/</a></li>
<li>Phrack Magazine: <a href="http://www.phrack.org/">http://www.phrack.org/</a></li>
<li>Lack Rack: <a href="https://www.google.com/search?q=ikea+lack+rack&amp;source=lnms">https://www.google.com/search?q=ikea+lack+rack&amp;source=lnms</a></li>
<li>ISS: <a href="https://www-03.ibm.com/press/us/en/pressrelease/20468.wss">https://www-03.ibm.com/press/us/en/pressrelease/20468.wss</a></li>
<li>Splunk Dev License: <a href="http://dev.splunk.com/">http://dev.splunk.com/</a></li>
<li>CIS 20 Controls: <a href="https://en.wikipedia.org/wiki/The_CIS_Critical_Security_Controls_for_Effective_Cyber_Defense">https://en.wikipedia.org/wiki/The_CIS_Critical_Security_Controls_for_Effective_Cyber_Defense</a></li>
<li>JA3: <a href="https://github.com/salesforce/ja3">https://github.com/salesforce/ja3</a></li>
<li>Irongeek: <a href="http://www.irongeek.com/">http://www.irongeek.com/</a></li>
<li>Netsec Reddit: <a href="https://reddit.com/r/netsec">https://reddit.com/r/netsec</a></li>
<li>SANS Holiday Hack Challenge: <a href="https://www.holidayhackchallenge.com/2018/">https://www.holidayhackchallenge.com/2018/</a></li>
<li>Garage Door Hack by Samy Kamkar: <a href="http://samy.pl/opensesame/">http://samy.pl/opensesame/</a></li>
<li>Sam Bowne's Class: <a href="https://samsclass.info">https://samsclass.info</a></li>
<li>Adrian's Presentation on YouTube: <a href="https://www.youtube.com/watch?v=8LF96Oq_pgo">https://www.youtube.com/watch?v=8LF96Oq_pgo</a> (Picture of lab at 24:05)</li>
<li>Intro Music by Trash80</li>
<li>Outro Music (Liberation Theology - Exploitation is Sin):<br><a href="https://open.spotify.com/album/0oc93ZsbMluxL8H994U9MW">https://open.spotify.com/album/0oc93ZsbMluxL8H994U9MW</a></li>
</ul><br/>
<p><strong>Learning Resource Mentioned:</strong></p>
<ul>
<li><a href="https://www.youtube.com/watch?v=6MYF6Zo6i6A">https://www.youtube.com/watch?v=6MYF6Zo6i6A</a> (based on <a href="https://www.coursera.org/learn/it-security">https://www.coursera.org/learn/it-security</a>)</li>
</ul><br/>
<p><strong>Getting Into Infosec:</strong></p>
<ul>
<li>Twitter: <a href="https://twitter.com/coffeewithayman">https://twitter.com/coffeewithayman</a></li>
<li>YouTube: <a href="https://www.youtube.com/channel/UCg6gV_gdfc188HZdN8LUx4A">https://www.youtube.com/channel/UCg6gV_gdfc188HZdN8LUx4A</a></li>
<li>Book: <a href="https://www.amazon.com/Breaking-Step-Step-Starting-Information-ebook/dp/B07N15GTPC/">https://www.amazon.com/Breaking-Step-Step-Starting-Information-ebook/dp/B07N15GTPC/</a></li>
</ul><br/><p>See <a href="https://omnystudio.com/listener">omnystudio.com/listener</a> for privacy information.</p><p>Mentioned in this episode:</p><p><a href="https://getting-into-infosec.captivate.fm/stayintouch">Stay In Touch</a></p>]]></content:encoded><link><![CDATA[https://getting-into-infosec.captivate.fm/episode/adrian-kaylor-from-network-admin-to-trainer-to-sales-engineer-for-life]]></link><guid isPermaLink="false">fad742d6-c1c4-4bfa-ba1c-aff4f76fa194</guid><itunes:image href="https://artwork.captivate.fm/2fbf39a3-1d5c-419c-918c-bb3560a5d5da/image.jpg"/><dc:creator><![CDATA[Ayman Elsawah (@coffeewithayman)]]></dc:creator><pubDate>Fri, 22 Feb 2019 04:50:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/070920b6-29ae-4c52-a07a-5edc6ba344d8/audio.mp3" length="34039359" type="audio/mpeg"/><itunes:duration>35:27</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>15</itunes:episode><podcast:episode>15</podcast:episode><itunes:summary>Adrian is the nerd brought in to talk to other nerds. He did not have a direct path to Security, but every role he had in his career helped him in his next role  and in security. He shares some hilarious stories as well as</itunes:summary><itunes:author>Ayman Elsawah (@coffeewithayman)</itunes:author></item><item><title>Nipun Gupta - From Security Consultant to Security Innovator</title><itunes:title>Nipun Gupta - From Security Consultant to Security Innovator</itunes:title><description><![CDATA[<p>Nipun graduated during the recession, but found a job as a consultant which helped him gain experience quickly. He was in fact discouraged to pursue a career in information security due to his immigrant status. Nipun is now a Cyber Security Executive focused on innovation.</p>
<p><strong>BIO:</strong></p>
<p>Nipun Gupta is a Cyber Security Executive at a large global financial institution focusing on innovation. Armed with many years of experience helping Fortune 500 companies solve cyber risk challenges, Nipun is tasked to help his employer discover, adopt, access new cybersecurity solutions protecting against emerging threats.</p>
<p>In the past two years, Nipun co-founded and ran the global Cyber Innovation Ecosystem strategy at a global consulting company with a specific focus on US and Israeli startups. He offers a strong network of security executives, startup founders, and the Venture Capital community in the West Coast and abroad. Technically proficient in network and application security, Nipun is a trusted advisor for many financial service institutions, technology, and telecom companies contributing to solutions worth tens of millions of dollars. Nipun completed his Masters of Information Technology and Information Security at Carnegie Mellon University, and has been collecting industry certifications like CISSP and SABSA ever since.</p>
<p><strong>Notes:</strong></p>
<ul>
<li>
<p>Was discouraged to go into cybersecurity due to his immigrant status</p>
</li>
<li>
<p>Graduated in a tough time during the 2008 recession</p>
</li>
<li>
<p>Discusses burnout and having to work odd hours for 6 months of the year</p>
</li>
<li>
<p>The show "24" was an influence in sparking the interest in information security</p>
</li>
<li>
<p>Shares an interesting war story where he accessed tons of files</p>
</li>
<li>
<p>Discusses the personality traits needed to be a consultant</p>
</li>
</ul><br/>
<p><strong>Quotes</strong></p>
<ul>
<li>"The biggest problem security professionals will continue to face is how to bridge that gap between technical conversation and business conversation."</li>
<li>"You have to be technical to understand the depth of the issue, but at the same time, you need to be able to express it in business language so non-technical people can make those decisions."</li>
<li>"I think you have to talk in terms of risk. Every business professional [in a] large or small company understands risk because risk can put them out of business."</li>
<li>"While I'm an introvert when it comes to working, I'm an extrovert when it comes to expressing my work-related conversations or expressing my work-related issues."</li>
</ul><br/>
<p><strong>Links:</strong></p>
<ul>
<li>Nipun on Twitter: <a href="https://twitter.com/nipungupta">https://twitter.com/nipungupta</a></li>
<li>Nipun on LinkedIN: <a href="https://www.linkedin.com/in/guptanipun/">https://www.linkedin.com/in/guptanipun/</a></li>
<li>SecurityTube:<a href="https://www.youtube.com/channel/UCBRNlyf9lURksAEnM-pyQdA"> https://www.youtube.com/channel/UCBRNlyf9lURksAEnM-pyQdA</a></li>
<li>Hak5: <a href="https://hak5.org">https://hak5.org</a></li>
<li>Nullcon: <a href="https://nullcon.net">https://nullcon.net</a></li>
<li>BayThreat: <a href="http://baythreat.org/">http://baythreat.org/</a></li>
<li>Intro Music - "Cascadia" by Trash80: <a href="https://trash80.com/#/content/133/weeklybeats-2012-week5">https://trash80.com/#/content/133/weeklybeats-2012-week5</a></li>
<li>Outro Music - "Put This Rap Together<br>" by Bobby Cole: <a href="https://www.audioblocks.com/stock-audio/put-this-rap-together%C2%A0-98857.html">https://www.audioblocks.com/stock-audio/put-this-rap-together%C2%A0-98857.html</a></li>
</ul><br/><p>See <a href="https://omnystudio.com/listener">omnystudio.com/listener</a> for privacy information.</p><p>Mentioned in this episode:</p><p><a href="https://getting-into-infosec.captivate.fm/stayintouch">Stay In Touch</a></p>]]></description><content:encoded><![CDATA[<p>Nipun graduated during the recession, but found a job as a consultant which helped him gain experience quickly. He was in fact discouraged to pursue a career in information security due to his immigrant status. Nipun is now a Cyber Security Executive focused on innovation.</p>
<p><strong>BIO:</strong></p>
<p>Nipun Gupta is a Cyber Security Executive at a large global financial institution focusing on innovation. Armed with many years of experience helping Fortune 500 companies solve cyber risk challenges, Nipun is tasked to help his employer discover, adopt, access new cybersecurity solutions protecting against emerging threats.</p>
<p>In the past two years, Nipun co-founded and ran the global Cyber Innovation Ecosystem strategy at a global consulting company with a specific focus on US and Israeli startups. He offers a strong network of security executives, startup founders, and the Venture Capital community in the West Coast and abroad. Technically proficient in network and application security, Nipun is a trusted advisor for many financial service institutions, technology, and telecom companies contributing to solutions worth tens of millions of dollars. Nipun completed his Masters of Information Technology and Information Security at Carnegie Mellon University, and has been collecting industry certifications like CISSP and SABSA ever since.</p>
<p><strong>Notes:</strong></p>
<ul>
<li>
<p>Was discouraged to go into cybersecurity due to his immigrant status</p>
</li>
<li>
<p>Graduated in a tough time during the 2008 recession</p>
</li>
<li>
<p>Discusses burnout and having to work odd hours for 6 months of the year</p>
</li>
<li>
<p>The show "24" was an influence in sparking the interest in information security</p>
</li>
<li>
<p>Shares an interesting war story where he accessed tons of files</p>
</li>
<li>
<p>Discusses the personality traits needed to be a consultant</p>
</li>
</ul><br/>
<p><strong>Quotes</strong></p>
<ul>
<li>"The biggest problem security professionals will continue to face is how to bridge that gap between technical conversation and business conversation."</li>
<li>"You have to be technical to understand the depth of the issue, but at the same time, you need to be able to express it in business language so non-technical people can make those decisions."</li>
<li>"I think you have to talk in terms of risk. Every business professional [in a] large or small company understands risk because risk can put them out of business."</li>
<li>"While I'm an introvert when it comes to working, I'm an extrovert when it comes to expressing my work-related conversations or expressing my work-related issues."</li>
</ul><br/>
<p><strong>Links:</strong></p>
<ul>
<li>Nipun on Twitter: <a href="https://twitter.com/nipungupta">https://twitter.com/nipungupta</a></li>
<li>Nipun on LinkedIN: <a href="https://www.linkedin.com/in/guptanipun/">https://www.linkedin.com/in/guptanipun/</a></li>
<li>SecurityTube:<a href="https://www.youtube.com/channel/UCBRNlyf9lURksAEnM-pyQdA"> https://www.youtube.com/channel/UCBRNlyf9lURksAEnM-pyQdA</a></li>
<li>Hak5: <a href="https://hak5.org">https://hak5.org</a></li>
<li>Nullcon: <a href="https://nullcon.net">https://nullcon.net</a></li>
<li>BayThreat: <a href="http://baythreat.org/">http://baythreat.org/</a></li>
<li>Intro Music - "Cascadia" by Trash80: <a href="https://trash80.com/#/content/133/weeklybeats-2012-week5">https://trash80.com/#/content/133/weeklybeats-2012-week5</a></li>
<li>Outro Music - "Put This Rap Together<br>" by Bobby Cole: <a href="https://www.audioblocks.com/stock-audio/put-this-rap-together%C2%A0-98857.html">https://www.audioblocks.com/stock-audio/put-this-rap-together%C2%A0-98857.html</a></li>
</ul><br/><p>See <a href="https://omnystudio.com/listener">omnystudio.com/listener</a> for privacy information.</p><p>Mentioned in this episode:</p><p><a href="https://getting-into-infosec.captivate.fm/stayintouch">Stay In Touch</a></p>]]></content:encoded><link><![CDATA[https://getting-into-infosec.captivate.fm/episode/nipun-gupta-from-security-consultant-to-security-innovator]]></link><guid isPermaLink="false">e09d331f-210a-4230-ba0b-444a8b186fa1</guid><itunes:image href="https://artwork.captivate.fm/8ef70927-6892-40f6-95d4-46cef15186c5/image.jpg"/><dc:creator><![CDATA[Ayman Elsawah (@coffeewithayman)]]></dc:creator><pubDate>Sat, 09 Feb 2019 22:54:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/83ff51a4-ce5e-4d52-958f-d4baec49c814/audio.mp3" length="22649124" type="audio/mpeg"/><itunes:duration>23:36</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>14</itunes:episode><podcast:episode>14</podcast:episode><itunes:summary>Nipun graduated during the recession, but found a job as a consultant which helped him gain experience quickly. He was in fact discouraged to pursue a career in information security due to his immigrant status. Nipun is now a Cyber Security Executive focused on innovation.</itunes:summary><itunes:author>Ayman Elsawah (@coffeewithayman)</itunes:author></item><item><title>BONUS - My Book is OUT: Breaking IN: A Step-by-Step Guide to Starting a Career in Information Security</title><itunes:title>BONUS - My Book is OUT: Breaking IN: A Step-by-Step Guide to Starting a Career in Information Security</itunes:title><description><![CDATA[<p>My book is out!</p>
<p>Breaking IN: A Step-by-Step Guide to Starting a Career in Information Security</p>
<p><a href="https://www.amazon.com/gp/product/B07N15GTPC">https://www.amazon.com/gp/product/B07N15GTPC</a></p><p>See <a href="https://omnystudio.com/listener">omnystudio.com/listener</a> for privacy information.</p><p>Mentioned in this episode:</p><p><a href="https://getting-into-infosec.captivate.fm/stayintouch">Stay In Touch</a></p>]]></description><content:encoded><![CDATA[<p>My book is out!</p>
<p>Breaking IN: A Step-by-Step Guide to Starting a Career in Information Security</p>
<p><a href="https://www.amazon.com/gp/product/B07N15GTPC">https://www.amazon.com/gp/product/B07N15GTPC</a></p><p>See <a href="https://omnystudio.com/listener">omnystudio.com/listener</a> for privacy information.</p><p>Mentioned in this episode:</p><p><a href="https://getting-into-infosec.captivate.fm/stayintouch">Stay In Touch</a></p>]]></content:encoded><link><![CDATA[https://getting-into-infosec.captivate.fm/episode/bonus-my-book-is-out-breaking-in-a-step-by-step-guide-to-starting-a-career-in-information-security]]></link><guid isPermaLink="false">a5a6b3dc-f4e9-468b-a6ba-c8bcebb42a72</guid><itunes:image href="https://artwork.captivate.fm/67e73b7a-686c-4d08-8fe8-3aea05e12cd2/image.jpg"/><dc:creator><![CDATA[Ayman Elsawah (@coffeewithayman)]]></dc:creator><pubDate>Fri, 25 Jan 2019 19:41:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/6390bf07-6f51-4c92-b460-8759640dec9c/audio.mp3" length="892298" type="audio/mpeg"/><itunes:duration>00:56</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>bonus</itunes:episodeType><itunes:summary>Hi Everyone! I&apos;m really excited to announce my book! You can find it on Amazon (link below) or at book.gettingintoinfosec.com.</itunes:summary><itunes:author>Ayman Elsawah (@coffeewithayman)</itunes:author></item><item><title>Marcus Carey - Childhood Builder/Breaker to Navy Cryptologist to Founder and Mentor</title><itunes:title>Marcus Carey - Childhood Builder/Breaker to Navy Cryptologist to Founder and Mentor</itunes:title><description><![CDATA[<p>Marcus Carey has been hacking since he was five. A true MacGuyver, he had to make do with the little resources available to him. He later enrolled in the Navy, worked for 3- letter agencies including the NSA, and now has his own security startup. Marcus shares a TON with us in this episode.</p>
<p><strong>BIO</strong></p>
<p>Marcus is renowned in the cybersecurity industry and has spent his more than 20-year career working in penetration testing, incident response, and digital forensics with federal agencies such as NSA, DC3, DIA, and DARPA. He started his career in cryptography in the U.S. Navy, and holds a Master&rsquo;s degree in Network Security from Capitol College. Marcus regularly speaks at security conferences across the country. He is passionate about giving back to the community through mentorship, hackathons, and speaking engagements, and is a voracious reader in his spare time.</p>
<p><strong>Notes:</strong></p>
<ul>
<li>
<p>Marcus had an opportunity to play college basketball, but couldn't since it was only a partial scholarship</p>
</li>
<li>
<p>After taking the ASVAB test, he had the choice of nuclear engineering or cryptography. He chose cryptography</p>
</li>
<li>
<p>Marcus made an Olympic-sized track pit up to spec as a child.</p>
</li>
<li>
<p>Marcus, like many other security professionals, had a strong artistic side. He achieved first chair in just a few weeks in Jr. High.</p>
</li>
<li>
<p>Marcus teaches us "How to Learn"</p>
</li>
<li>
<p>Marcus achieved over 115 college credits on his own, without attending college!</p>
</li>
<li>
<p>Open source tools Marcus created ended up being used be used to save people's lives in other parts of the world</p>
</li>
</ul><br/>
<p><strong>Quotes:</strong></p>
<ul>
<li>
<p>"[I] told them all I wanted to do was work with computers."</p>
</li>
<li>
<p>"I've always been a tinkerer. I built stuff, I was a science fair geek... the whole nine."</p>
</li>
<li>
<p>"I was the poorest person growing up... so anything I did was a hack. I made my own hacky sack. I used to make my own toys."</p>
</li>
<li>
<p>"You can't learn how Marcus learns because everyone is different.... Nobody can tell you how to learn as good as yourself."</p>
</li>
<li>
<p>"So now, I'm like a finely tuned weapon when it comes to learning... cause I know exactly how to learn."</p>
</li>
<li>
<p>"Never be surprised how your work turns out to be used for good... it actually blew my mind that my stuff was being used to do that [saving people's lives]. "</p>
</li>
<li>
<p>"Show externally that you've mastered those concepts in some way."</p>
</li>
<li>
<p>"Sometimes your employees are going to go rogue, and hopefully, you can detect when they do."</p>
</li>
<li>
<p>"If you're focusing on a specific set of skills that are evergreen, and if you work that long enough, it doesn't matter your aptitude: you can become an expert at that."</p>
</li>
<li>
<p>"There are people out here that are celebrities, and they act like they know everything. Don't be one of those people."</p>
</li>
<li>
<p>"Aptitude allows people to learn stuff faster. I think the military requires you to learn stuff fast."</p>
</li>
</ul><br/>
<p><strong>Links:</strong></p>
<ul>
<li>
<p>Marcus Carey Twitter (<a href="https://twitter.com/marcusjcarey">@marcusjcarey</a>)</p>
</li>
<li>
<p>Marcus's Company: <a href="https://www.threatcare.com/">Threatcare</a></p>
</li>
<li>
<p><a href="https://www.todaysmilitary.com/joining/asvab-test">ASVAB Test</a></p>
</li>
<li>
<p><a href="https://en.wikipedia.org/wiki/MacGyver">MacGuyver</a></p>
</li>
<li>
<p><a href="https://learnpythonthehardway.org/">Python The Hard Way</a></p>
</li>
<li>
<p><a href="https://en.wikipedia.org/wiki/Subvocalization">Sub-Vocalization</a></p>
</li>
<li>
<p>Book: "<a href="https://www.amazon.com/How-Measure-Anything-Cybersecurity-Risk/dp/1536669741">How to Measure Anything in Cybersecurity...]]></description><content:encoded><![CDATA[<p>Marcus Carey has been hacking since he was five. A true MacGuyver, he had to make do with the little resources available to him. He later enrolled in the Navy, worked for 3- letter agencies including the NSA, and now has his own security startup. Marcus shares a TON with us in this episode.</p>
<p><strong>BIO</strong></p>
<p>Marcus is renowned in the cybersecurity industry and has spent his more than 20-year career working in penetration testing, incident response, and digital forensics with federal agencies such as NSA, DC3, DIA, and DARPA. He started his career in cryptography in the U.S. Navy, and holds a Master&rsquo;s degree in Network Security from Capitol College. Marcus regularly speaks at security conferences across the country. He is passionate about giving back to the community through mentorship, hackathons, and speaking engagements, and is a voracious reader in his spare time.</p>
<p><strong>Notes:</strong></p>
<ul>
<li>
<p>Marcus had an opportunity to play college basketball, but couldn't since it was only a partial scholarship</p>
</li>
<li>
<p>After taking the ASVAB test, he had the choice of nuclear engineering or cryptography. He chose cryptography</p>
</li>
<li>
<p>Marcus made an Olympic-sized track pit up to spec as a child.</p>
</li>
<li>
<p>Marcus, like many other security professionals, had a strong artistic side. He achieved first chair in just a few weeks in Jr. High.</p>
</li>
<li>
<p>Marcus teaches us "How to Learn"</p>
</li>
<li>
<p>Marcus achieved over 115 college credits on his own, without attending college!</p>
</li>
<li>
<p>Open source tools Marcus created ended up being used be used to save people's lives in other parts of the world</p>
</li>
</ul><br/>
<p><strong>Quotes:</strong></p>
<ul>
<li>
<p>"[I] told them all I wanted to do was work with computers."</p>
</li>
<li>
<p>"I've always been a tinkerer. I built stuff, I was a science fair geek... the whole nine."</p>
</li>
<li>
<p>"I was the poorest person growing up... so anything I did was a hack. I made my own hacky sack. I used to make my own toys."</p>
</li>
<li>
<p>"You can't learn how Marcus learns because everyone is different.... Nobody can tell you how to learn as good as yourself."</p>
</li>
<li>
<p>"So now, I'm like a finely tuned weapon when it comes to learning... cause I know exactly how to learn."</p>
</li>
<li>
<p>"Never be surprised how your work turns out to be used for good... it actually blew my mind that my stuff was being used to do that [saving people's lives]. "</p>
</li>
<li>
<p>"Show externally that you've mastered those concepts in some way."</p>
</li>
<li>
<p>"Sometimes your employees are going to go rogue, and hopefully, you can detect when they do."</p>
</li>
<li>
<p>"If you're focusing on a specific set of skills that are evergreen, and if you work that long enough, it doesn't matter your aptitude: you can become an expert at that."</p>
</li>
<li>
<p>"There are people out here that are celebrities, and they act like they know everything. Don't be one of those people."</p>
</li>
<li>
<p>"Aptitude allows people to learn stuff faster. I think the military requires you to learn stuff fast."</p>
</li>
</ul><br/>
<p><strong>Links:</strong></p>
<ul>
<li>
<p>Marcus Carey Twitter (<a href="https://twitter.com/marcusjcarey">@marcusjcarey</a>)</p>
</li>
<li>
<p>Marcus's Company: <a href="https://www.threatcare.com/">Threatcare</a></p>
</li>
<li>
<p><a href="https://www.todaysmilitary.com/joining/asvab-test">ASVAB Test</a></p>
</li>
<li>
<p><a href="https://en.wikipedia.org/wiki/MacGyver">MacGuyver</a></p>
</li>
<li>
<p><a href="https://learnpythonthehardway.org/">Python The Hard Way</a></p>
</li>
<li>
<p><a href="https://en.wikipedia.org/wiki/Subvocalization">Sub-Vocalization</a></p>
</li>
<li>
<p>Book: "<a href="https://www.amazon.com/How-Measure-Anything-Cybersecurity-Risk/dp/1536669741">How to Measure Anything in Cybersecurity Risk</a>"</p>
</li>
<li>
<p><a href="https://clep.collegeboard.org/">Clep Test</a></p>
</li>
<li>
<p><a href="https://getcollegecredit.com/">DSST</a></p>
</li>
<li>
<p><a href="https://en.wikipedia.org/wiki/Excelsior_College_Examinations">Excelsior College Examinations</a></p>
</li>
<li>
<p>Book: "<a href="https://www.amazon.com/Never-Split-Difference-Negotiating-Depended-ebook/dp/B014DUR7L2">Never split the difference on negotiating</a>"</p>
</li>
<li>
<p><a href="https://www.google.com/search?q=threat+agent+marcus+carey">Threat Agent</a> and <a href="https://twitter.com/honeydocs">Honeydocs</a></p>
</li>
<li>
<p>Intro Music: <a href="https://trash80.com/#/content/133/weeklybeats-2012-week5">Cascadia</a> by <a href="https://twitter.com/trash80">@Trash80</a></p>
</li>
<li>
<p>Outro Music: <a href="http://freemusicarchive.org/music/Yung_Kartz/October_2018/Coupe">Coupe</a> by <a href="https://twitter.com/yungkartz">@yungkartz</a></p>
</li>
</ul><br/>
<p><strong>Resources Mentioned:</strong></p>
<ul>
<li><a href="https://azeria-labs.com/paradox-of-choice/">The Paradox of Choice by Azeria Labs</a></li>
<li><a href="https://www.cyberseek.org/pathway.html">Cyberseek Pathways</a></li>
</ul><br/><p>See <a href="https://omnystudio.com/listener">omnystudio.com/listener</a> for privacy information.</p><p>Mentioned in this episode:</p><p><a href="https://getting-into-infosec.captivate.fm/stayintouch">Stay In Touch</a></p>]]></content:encoded><link><![CDATA[https://getting-into-infosec.captivate.fm/episode/marcus-carey-childhood-builder-breaker-to-navy-cryptologist-to-founder-and-mentor]]></link><guid isPermaLink="false">af94a5c6-0ff3-48dd-a821-3383f1916db3</guid><itunes:image href="https://artwork.captivate.fm/57cda3b7-5f6e-4883-9690-42eb4f1413c0/image.jpg"/><dc:creator><![CDATA[Ayman Elsawah (@coffeewithayman)]]></dc:creator><pubDate>Fri, 11 Jan 2019 08:10:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/bf2be55b-4b4d-4490-ad84-587e129be5e7/audio.mp3" length="41832219" type="audio/mpeg"/><itunes:duration>43:34</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>13</itunes:episode><podcast:episode>13</podcast:episode><itunes:summary>Marcus Carey has been hacking since we was five. A true MacGuyver he had to make due with little resources available to him. He later enrolled for the Navy, worked for 3 letter agencies including the NSA, and now has his own security startup. Marcus shares a TON with us in this episode.</itunes:summary><itunes:author>Ayman Elsawah (@coffeewithayman)</itunes:author></item><item><title>Jack Rhysider - From Odd-jobs to Network Analyst to SOC Architect  to... Darknet Diaries!</title><itunes:title>Jack Rhysider - From Odd-jobs to Network Analyst to SOC Architect  to... Darknet Diaries!</itunes:title><description><![CDATA[<p>With an engineering background, Jack found himself doing odd jobs at first. Looking to get back into tech, he certed up and got a job in the NOC (Network Operation Center) and eventually became a SOC architect building a SOC from scratch. Looking to do something different, he started Dark Net Diaries, and it's been an adventure since! This is Jack Rhysider's origin story.</p>
<p><strong>BIO</strong></p>
<p>Jack Rhysider started his professional career in a NOC. He then became a network security engineer doing a lot of work to harden the network and detect threats in the network. He became a security architect and successfully built a SOC for a MSSP. He's currently the host of the podcast <em>Darknet Diaries,</em> where he interviews hackers or those who've suffered a major attack. The podcast has experienced phenomenal growth, so Jack now works on it full time.</p>
<p><strong>Notes</strong></p>
<ul>
<li>
<p>A glimpse into the life of a security analyst and a Managed SOC</p>
</li>
<li>
<p>Takes about 3-6 months for an analyst to baseline and come up to speed</p>
</li>
<li>
<p>His first hack was hacking the Sim City savegame file. Dad was thrilled!</p>
</li>
<li>
<p>Several years of blogging his journey in Infosec helped Jack with his communication skills and explaining difficult concepts to people.</p>
</li>
</ul><br/>
<p><strong>Quotes:</strong></p>
<ul>
<li>
<p>"As a security engineer, I need to know a little bit about everything."</p>
</li>
<li>
<p>"I would do things like remove (rm -f /) the whole root directory just to see how many files I could delete before the whole operating system would crash!"</p>
</li>
<li>
<p>"Be fearless, grandma!"</p>
</li>
<li>
<p>"I think there is a lot of shaming that goes on if people... do security wrong... that kind of makes things stressful."</p>
</li>
<li>
<p>"I think what [we], as security people, lack sometimes is good communication."</p>
</li>
<li>
<p>"Taking on tasks when nobody asked them to take it on... is amazing!"</p>
</li>
<li>
<p>"I would keep corrupting files over and over, but eventually, I figured out which byte in the file was for the amount of money, and I was able to give myself a billion dollars!"</p>
</li>
</ul><br/>
<p><strong>Links:</strong></p>
<ul>
<li><a href="https://darknetdiaries.com/">Darknet Diaries Podcast</a></li>
<li><a href="https://twitter.com/JackRhysider">@JackRhysider</a></li>
<li><a href="https://www.cfptime.org/">CFP Time</a></li>
<li>Intro Music by <a href="https://trash80.com/">Trash80</a></li>
<li>Outro Music by <a href="http://freemusicarchive.org/music/Ask%20Again/Sound_Forest_Atmospheric_Tracks/Breathing_Out_1636">Mid-Air Machine</a></li>
</ul><br/><p>See <a href="https://omnystudio.com/listener">omnystudio.com/listener</a> for privacy information.</p><p>Mentioned in this episode:</p><p><a href="https://getting-into-infosec.captivate.fm/stayintouch">Stay In Touch</a></p>]]></description><content:encoded><![CDATA[<p>With an engineering background, Jack found himself doing odd jobs at first. Looking to get back into tech, he certed up and got a job in the NOC (Network Operation Center) and eventually became a SOC architect building a SOC from scratch. Looking to do something different, he started Dark Net Diaries, and it's been an adventure since! This is Jack Rhysider's origin story.</p>
<p><strong>BIO</strong></p>
<p>Jack Rhysider started his professional career in a NOC. He then became a network security engineer doing a lot of work to harden the network and detect threats in the network. He became a security architect and successfully built a SOC for a MSSP. He's currently the host of the podcast <em>Darknet Diaries,</em> where he interviews hackers or those who've suffered a major attack. The podcast has experienced phenomenal growth, so Jack now works on it full time.</p>
<p><strong>Notes</strong></p>
<ul>
<li>
<p>A glimpse into the life of a security analyst and a Managed SOC</p>
</li>
<li>
<p>Takes about 3-6 months for an analyst to baseline and come up to speed</p>
</li>
<li>
<p>His first hack was hacking the Sim City savegame file. Dad was thrilled!</p>
</li>
<li>
<p>Several years of blogging his journey in Infosec helped Jack with his communication skills and explaining difficult concepts to people.</p>
</li>
</ul><br/>
<p><strong>Quotes:</strong></p>
<ul>
<li>
<p>"As a security engineer, I need to know a little bit about everything."</p>
</li>
<li>
<p>"I would do things like remove (rm -f /) the whole root directory just to see how many files I could delete before the whole operating system would crash!"</p>
</li>
<li>
<p>"Be fearless, grandma!"</p>
</li>
<li>
<p>"I think there is a lot of shaming that goes on if people... do security wrong... that kind of makes things stressful."</p>
</li>
<li>
<p>"I think what [we], as security people, lack sometimes is good communication."</p>
</li>
<li>
<p>"Taking on tasks when nobody asked them to take it on... is amazing!"</p>
</li>
<li>
<p>"I would keep corrupting files over and over, but eventually, I figured out which byte in the file was for the amount of money, and I was able to give myself a billion dollars!"</p>
</li>
</ul><br/>
<p><strong>Links:</strong></p>
<ul>
<li><a href="https://darknetdiaries.com/">Darknet Diaries Podcast</a></li>
<li><a href="https://twitter.com/JackRhysider">@JackRhysider</a></li>
<li><a href="https://www.cfptime.org/">CFP Time</a></li>
<li>Intro Music by <a href="https://trash80.com/">Trash80</a></li>
<li>Outro Music by <a href="http://freemusicarchive.org/music/Ask%20Again/Sound_Forest_Atmospheric_Tracks/Breathing_Out_1636">Mid-Air Machine</a></li>
</ul><br/><p>See <a href="https://omnystudio.com/listener">omnystudio.com/listener</a> for privacy information.</p><p>Mentioned in this episode:</p><p><a href="https://getting-into-infosec.captivate.fm/stayintouch">Stay In Touch</a></p>]]></content:encoded><link><![CDATA[https://getting-into-infosec.captivate.fm/episode/jack-rhysider-from-odd-jobs-to-network-analyst-to-soc-architect-to-darknet-diaries]]></link><guid isPermaLink="false">e3716b5b-e6f0-489c-a4d9-ac3da28ae78d</guid><itunes:image href="https://artwork.captivate.fm/9d424593-5997-4e0b-9ce4-525f0b25c633/image.jpg"/><dc:creator><![CDATA[Ayman Elsawah (@coffeewithayman)]]></dc:creator><pubDate>Tue, 01 Jan 2019 20:45:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/7d004661-3268-49a2-af1f-735507493a1c/audio.mp3" length="45697930" type="audio/mpeg"/><itunes:duration>47:36</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>12</itunes:episode><podcast:episode>12</podcast:episode><itunes:summary>Jack Rhysider&apos;s origin story. With an engineering background Jack found himself doing odd jobs at first. Looking to get back into tech he &quot;certed&quot; up and got a job in the NOC (Network Operation Center) and eventually became a SOC architect building a SOC from scratch. Looking to do something different, he started Dark Net Diaries and it&apos;s been an adventure since!</itunes:summary><itunes:author>Ayman Elsawah (@coffeewithayman)</itunes:author></item><item><title>Yaron Levi - Entrepreneur to Security Architect to CISO and Security Champion</title><itunes:title>Yaron Levi - Entrepreneur to Security Architect to CISO and Security Champion</itunes:title><description><![CDATA[<p>Yaron Levi is the CISO for Blue Cross and Blue Shield of Kansas City. We talk about what he looks for in people when hiring in Infosec and a time when he took a chance on someone (against the opinion of his peers), and his chance was a big success. We also discuss a breach he had to deal with only 3 months into his job!</p>
<p><strong>BIO</strong></p>
<p>Yaron Levi is the CISO for Blue Cross and Blue Shield of Kansas City (Blue KC). In this role, he manages a team responsible for information risk management, cyber defense, regulatory and compliance, architecture and engineering, and identity and access management for an organization that provides health insurance for about 1 million members and has over $2B in annual revenue.</p>
<p>Prior to joining Blue KC, Yaron was a Director of Information Security for Cerner Corporation, an Information Security Business Partner for Intuit, an Information Security Architect and Product Manager for eBay, and a Director of Cloud Security for ANX.</p>
<p>Yaron is a Research Fellow for the Cloud Security Alliance (CSA). The Research Fellow designation is the highest honor and distinction given to a CSA research volunteer who has demonstrated significant contributions to CSA research. Yaron is a co-chair and lead architect of the Cloud Enterprise Architecture. Contributor to the Consensus Assessments Initiative Questionnaire (CAIQ), Cloud Controls Matrix and promoted the CSA as best practice in various cloud projects with various Fortune 500 companies.</p>
<p>Yaron is the co-founder of the Kansas City CISO forum, B-Sides Kansas City, and is a frequent speaker on Cyber Security Architecture, DevSecOps, and Cyber Defense.</p>
<p>Yaron holds a B.A. in Social Sciences and Management and is a graduate from the FBI CISO Academy.</p>
<p><strong>Notes:</strong></p>
<ul>
<li>
<p>Created his own IT company to pay his way through college</p>
</li>
<li>
<p>A SOX Compliance project was his first exp</p>
</li>
<li>
<p>His first computer was a <a href="https://en.wikipedia.org/wiki/ZX81">Sinclair ZX81</a></p>
</li>
<li>
<p>Had to save up to buy his own Commodore 64!</p>
</li>
<li>
<p>Yaron's discussion with youth whether a laptop is more dangerous than a gun? What about the 2nd Amendment?</p>
</li>
<li>
<p>3-months into his job, he experienced a breach!</p>
</li>
</ul><br/>
<p><strong>Quotes:</strong></p>
<ul>
<li>
<p>"Security is one of those areas that you can be part of something that is bigger than yourself."</p>
</li>
<li>
<p>"Having a real calling for something... that can make a difference."</p>
</li>
<li>
<p>"It's one of those communities [where] people really want to help each other."</p>
</li>
<li>
<p>"I think, for many people, there isn't a prescription, if you will, of how and where to start."</p>
</li>
<li>
<p>"Are you the type of person who likes to crack codes and puzzles and bang your head against the wall for 16 hours...that may lead you to a dead-end or nothing? Oh no, I like to talk to people."</p>
</li>
<li>
<p>"First and foremost, we are educators."</p>
</li>
<li>
<p>"Sometimes, when we look for people, we tend to look for people based on a very specific mold or template [unfortunately]"</p>
</li>
<li>
<p>"Usually, I hire for character first, then skill."</p>
</li>
<li>
<p>"At the end of that record is a person... a human being."</p>
</li>
<li>
<p>"I think people need to realize that it can be a very thankless job, not just hoodies and hackers all day long. If you google a "Hacker" today... it's kind of depressing to everyone with hoodies like that... that's not the reality."</p>
</li>
<li>
<p>"It's all about defense... protection... enablement of the business securely. When everything goes well, nobody really thinks of you, nobody thanks you for that. But when something bad happens, everybody looks for a head to chop."</p>
</li>
<li>
<p>"It's, in my opinion, one of the more rewarding careers one could have and being...]]></description><content:encoded><![CDATA[<p>Yaron Levi is the CISO for Blue Cross and Blue Shield of Kansas City. We talk about what he looks for in people when hiring in Infosec and a time when he took a chance on someone (against the opinion of his peers), and his chance was a big success. We also discuss a breach he had to deal with only 3 months into his job!</p>
<p><strong>BIO</strong></p>
<p>Yaron Levi is the CISO for Blue Cross and Blue Shield of Kansas City (Blue KC). In this role, he manages a team responsible for information risk management, cyber defense, regulatory and compliance, architecture and engineering, and identity and access management for an organization that provides health insurance for about 1 million members and has over $2B in annual revenue.</p>
<p>Prior to joining Blue KC, Yaron was a Director of Information Security for Cerner Corporation, an Information Security Business Partner for Intuit, an Information Security Architect and Product Manager for eBay, and a Director of Cloud Security for ANX.</p>
<p>Yaron is a Research Fellow for the Cloud Security Alliance (CSA). The Research Fellow designation is the highest honor and distinction given to a CSA research volunteer who has demonstrated significant contributions to CSA research. Yaron is a co-chair and lead architect of the Cloud Enterprise Architecture. Contributor to the Consensus Assessments Initiative Questionnaire (CAIQ), Cloud Controls Matrix and promoted the CSA as best practice in various cloud projects with various Fortune 500 companies.</p>
<p>Yaron is the co-founder of the Kansas City CISO forum, B-Sides Kansas City, and is a frequent speaker on Cyber Security Architecture, DevSecOps, and Cyber Defense.</p>
<p>Yaron holds a B.A. in Social Sciences and Management and is a graduate from the FBI CISO Academy.</p>
<p><strong>Notes:</strong></p>
<ul>
<li>
<p>Created his own IT company to pay his way through college</p>
</li>
<li>
<p>A SOX Compliance project was his first exp</p>
</li>
<li>
<p>His first computer was a <a href="https://en.wikipedia.org/wiki/ZX81">Sinclair ZX81</a></p>
</li>
<li>
<p>Had to save up to buy his own Commodore 64!</p>
</li>
<li>
<p>Yaron's discussion with youth whether a laptop is more dangerous than a gun? What about the 2nd Amendment?</p>
</li>
<li>
<p>3-months into his job, he experienced a breach!</p>
</li>
</ul><br/>
<p><strong>Quotes:</strong></p>
<ul>
<li>
<p>"Security is one of those areas that you can be part of something that is bigger than yourself."</p>
</li>
<li>
<p>"Having a real calling for something... that can make a difference."</p>
</li>
<li>
<p>"It's one of those communities [where] people really want to help each other."</p>
</li>
<li>
<p>"I think, for many people, there isn't a prescription, if you will, of how and where to start."</p>
</li>
<li>
<p>"Are you the type of person who likes to crack codes and puzzles and bang your head against the wall for 16 hours...that may lead you to a dead-end or nothing? Oh no, I like to talk to people."</p>
</li>
<li>
<p>"First and foremost, we are educators."</p>
</li>
<li>
<p>"Sometimes, when we look for people, we tend to look for people based on a very specific mold or template [unfortunately]"</p>
</li>
<li>
<p>"Usually, I hire for character first, then skill."</p>
</li>
<li>
<p>"At the end of that record is a person... a human being."</p>
</li>
<li>
<p>"I think people need to realize that it can be a very thankless job, not just hoodies and hackers all day long. If you google a "Hacker" today... it's kind of depressing to everyone with hoodies like that... that's not the reality."</p>
</li>
<li>
<p>"It's all about defense... protection... enablement of the business securely. When everything goes well, nobody really thinks of you, nobody thanks you for that. But when something bad happens, everybody looks for a head to chop."</p>
</li>
<li>
<p>"It's, in my opinion, one of the more rewarding careers one could have and being part of something bigger than just themselves."</p>
</li>
</ul><br/>
<p><strong>Links:</strong></p>
<ul>
<li><a href="https://www.linkedin.com/in/yaronrl/">Yaron Levi on Linked IN</a></li>
<li><a href="https://twitter.com/0xL3v1">Yaron on Twitter</a></li>
<li><a href="https://www.wiskc.org/">Women in Security KC</a></li>
<li><a href="https://www.bsideskc.org/">BSides KC</a></li>
<li><a href="https://seckc.org/">Sec KC</a></li>
<li>Intro Music: <a href="https://trash80.com/#/content/133/weeklybeats-2012-week5">Cascadia</a> by <a href="https://trash80.com/">Trash80</a></li>
<li>Outro: <a href="https://www.youtube.com/watch?v=vAIfTtmdqDI">A Rising Wave - Jeremy Blake</a></li>
</ul><br/><p>See <a href="https://omnystudio.com/listener">omnystudio.com/listener</a> for privacy information.</p><p>Mentioned in this episode:</p><p><a href="https://getting-into-infosec.captivate.fm/stayintouch">Stay In Touch</a></p>]]></content:encoded><link><![CDATA[https://getting-into-infosec.captivate.fm/episode/yaron-levi-entrepreneur-to-security-architect-to-ciso-and-security-champion]]></link><guid isPermaLink="false">d02178bd-f5e2-46dc-9739-2b70f6b48934</guid><itunes:image href="https://artwork.captivate.fm/93c1b382-4644-469a-ab55-a5e5f8152e13/image.jpg"/><dc:creator><![CDATA[Ayman Elsawah (@coffeewithayman)]]></dc:creator><pubDate>Tue, 25 Dec 2018 09:07:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/0c2a1ff9-5680-4acf-ba85-89ae735a2474/audio.mp3" length="33805725" type="audio/mpeg"/><itunes:duration>35:13</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>11</itunes:episode><podcast:episode>11</podcast:episode><itunes:summary>Yaron Levi is the CISO for Blue Cross and Blue Shield of Kansas City. We talk about what he looks for in people when hiring in Infosec and a time when he took a chance on someone (against the opinion of his peers) and his chance was a big success. We also discuss a breach he had to deal with only 3 months into his job!</itunes:summary><itunes:author>Ayman Elsawah (@coffeewithayman)</itunes:author></item><item><title>InfoSteph - From Journalism to IT Support to Security Analyst</title><itunes:title>InfoSteph - From Journalism to IT Support to Security Analyst</itunes:title><description><![CDATA[<p>Steph is brand new to the infosec field! We go over her interesting and eventful path into Information Security, reflections on her role today, and some fascinating war stories!</p>
<p><strong>BIO:</strong></p>
<p>Steph is a Security Analyst for a retail company makes up the team of one. She has a background in journalism and web hosting. She is the creator and editor of StephAndSec.com, a blog focused on technology, inclusion, and lifetime learning. Stephanie's life work is to encourage and fight for more diversity and inclusion in tech spaces for more innovative and original collaboration. She spends her time mentoring high school students, hosting virtual labs via Women In Tech-a-thons, and learning as much as she can about anything and everything. Stephanie believes that giving back to the community at every stage is very important. In addition to technology, Stephanie has a secondary passion for Psychology, so don't be frightened if you hear her discuss cognitive distortions or attachment styles. She hopes to develop research that explores the dichotomy between human beings and technology. She is currently on a mission to speak at three events in 2019 and has already been booked for one event.</p>
<p><strong>Notes:</strong></p>
<ul>
<li>
<p>Dreams of Creative Writing, but chose Journalism for practicality</p>
</li>
<li>
<p>Encouraged to Computer Science by her mom</p>
</li>
<li>
<p>Had her eye on Security, through IT or Web Hosting... eventually.</p>
</li>
<li>
<p>A story of being so close, yet so far</p>
</li>
<li>
<p>Was very close to giving up on the whole industry due to the difficulty and lack of encouragement... but was NOT comfortable with quitting.</p>
</li>
</ul><br/>
<p><strong>Quotes:</strong></p>
<ul>
<li>
<p>"You have to talk to strangers about their story... you want me to walk up to a complete stranger as an introvert? Uh.. what?"</p>
</li>
<li>
<p>"The type of person I am, I can't fully commit to something without getting my hands dirty."</p>
</li>
<li>
<p>"The way that I learn is situational."</p>
</li>
<li>
<p>"We had a vulnerability scan tool and so I just tried to work with that."&nbsp;</p>
</li>
<li>
<p>"It's kind of like what doctors have to do before they [can] become a doctor."</p>
</li>
<li>
<p>"So many people are trying to get into the industry and facing the same issue. I've done all these things people have told me to and it hasn't gotten me anywhere."</p>
</li>
<li>
<p>"Just do a bunch of stuff until it sticks!"</p>
</li>
<li>
<p>"Twitter was one of the best... decision I made."</p>
</li>
<li>
<p>"Get a champion that is more senior than you."</p>
</li>
<li>
<p>"Don't count yourself out, before someone else has counted you out."</p>
</li>
<li>
<p>"The lessons that are best learned are the ones that resulted in catastrophic failure."</p>
</li>
<li>
<p>"When you want to be a lawyer, you go to law school, you sit for the bar. There ya go! There's a plan."&nbsp;</p>
</li>
</ul><br/>
<p><strong>Links:</strong></p>
<ul>
<li>
<p>Steph's Website: <a href="https://stephandsec.com/">https://stephandsec.com/</a></p>
</li>
<li>
<p>Speaking engagement next year: <a href="https://2019.tabgeeks.com/speakers#steph">https://2019.tabgeeks.com/speakers#steph</a></p>
</li>
<li>
<p>Steph's Tech a Thon's:<a href="https://mailchi.mp/70c8010c3320/tech-a-thon-comeback"> https://mailchi.mp/70c8010c3320/tech-a-thon-comeback</a></p>
</li>
<li>
<p>WISP - Women in Security and Privacy: <a href="https://www.wisporg.com/">https://www.wisporg.com/</a></p>
</li>
<li>
<p>Intro - Cascadia by Trash 80: <a href="https://trash80.com/#/content/133/weeklybeats-2012-week5">https://trash80.com/#/content/133/weeklybeats-2012-week5</a></p>
</li>
<li>
<p>Outro - That Night In Your Car - Spazz Cardigan: <a href="https://www.youtube.com/watch?v=1yzuoAOd238">https://www.youtube.com/watch?v=1yzuoAOd238</a></p>
</li>
</ul><br/>...]]></description><content:encoded><![CDATA[<p>Steph is brand new to the infosec field! We go over her interesting and eventful path into Information Security, reflections on her role today, and some fascinating war stories!</p>
<p><strong>BIO:</strong></p>
<p>Steph is a Security Analyst for a retail company makes up the team of one. She has a background in journalism and web hosting. She is the creator and editor of StephAndSec.com, a blog focused on technology, inclusion, and lifetime learning. Stephanie's life work is to encourage and fight for more diversity and inclusion in tech spaces for more innovative and original collaboration. She spends her time mentoring high school students, hosting virtual labs via Women In Tech-a-thons, and learning as much as she can about anything and everything. Stephanie believes that giving back to the community at every stage is very important. In addition to technology, Stephanie has a secondary passion for Psychology, so don't be frightened if you hear her discuss cognitive distortions or attachment styles. She hopes to develop research that explores the dichotomy between human beings and technology. She is currently on a mission to speak at three events in 2019 and has already been booked for one event.</p>
<p><strong>Notes:</strong></p>
<ul>
<li>
<p>Dreams of Creative Writing, but chose Journalism for practicality</p>
</li>
<li>
<p>Encouraged to Computer Science by her mom</p>
</li>
<li>
<p>Had her eye on Security, through IT or Web Hosting... eventually.</p>
</li>
<li>
<p>A story of being so close, yet so far</p>
</li>
<li>
<p>Was very close to giving up on the whole industry due to the difficulty and lack of encouragement... but was NOT comfortable with quitting.</p>
</li>
</ul><br/>
<p><strong>Quotes:</strong></p>
<ul>
<li>
<p>"You have to talk to strangers about their story... you want me to walk up to a complete stranger as an introvert? Uh.. what?"</p>
</li>
<li>
<p>"The type of person I am, I can't fully commit to something without getting my hands dirty."</p>
</li>
<li>
<p>"The way that I learn is situational."</p>
</li>
<li>
<p>"We had a vulnerability scan tool and so I just tried to work with that."&nbsp;</p>
</li>
<li>
<p>"It's kind of like what doctors have to do before they [can] become a doctor."</p>
</li>
<li>
<p>"So many people are trying to get into the industry and facing the same issue. I've done all these things people have told me to and it hasn't gotten me anywhere."</p>
</li>
<li>
<p>"Just do a bunch of stuff until it sticks!"</p>
</li>
<li>
<p>"Twitter was one of the best... decision I made."</p>
</li>
<li>
<p>"Get a champion that is more senior than you."</p>
</li>
<li>
<p>"Don't count yourself out, before someone else has counted you out."</p>
</li>
<li>
<p>"The lessons that are best learned are the ones that resulted in catastrophic failure."</p>
</li>
<li>
<p>"When you want to be a lawyer, you go to law school, you sit for the bar. There ya go! There's a plan."&nbsp;</p>
</li>
</ul><br/>
<p><strong>Links:</strong></p>
<ul>
<li>
<p>Steph's Website: <a href="https://stephandsec.com/">https://stephandsec.com/</a></p>
</li>
<li>
<p>Speaking engagement next year: <a href="https://2019.tabgeeks.com/speakers#steph">https://2019.tabgeeks.com/speakers#steph</a></p>
</li>
<li>
<p>Steph's Tech a Thon's:<a href="https://mailchi.mp/70c8010c3320/tech-a-thon-comeback"> https://mailchi.mp/70c8010c3320/tech-a-thon-comeback</a></p>
</li>
<li>
<p>WISP - Women in Security and Privacy: <a href="https://www.wisporg.com/">https://www.wisporg.com/</a></p>
</li>
<li>
<p>Intro - Cascadia by Trash 80: <a href="https://trash80.com/#/content/133/weeklybeats-2012-week5">https://trash80.com/#/content/133/weeklybeats-2012-week5</a></p>
</li>
<li>
<p>Outro - That Night In Your Car - Spazz Cardigan: <a href="https://www.youtube.com/watch?v=1yzuoAOd238">https://www.youtube.com/watch?v=1yzuoAOd238</a></p>
</li>
</ul><br/>
<p><strong>Resources</strong>:</p>
<ul>
<li>
<p>HackEDU: <a href="https://hackedu.io/">https://hackedu.io/</a></p>
</li>
<li>
<p>Open Bug Bounty.org: <a href="https://www.openbugbounty.org/">https://www.openbugbounty.org/</a></p>
</li>
</ul><br/>
<p><strong>Getting Into Infosec:</strong></p>
<ul>
<li>
<p>Twitter: <a href="https://twitter.com/coffeewithayman">https://twitter.com/coffeewithayman</a></p>
</li>
<li>
<p>YouTube: <a href="https://www.youtube.com/channel/UCg6gV_gdfc188HZdN8LUx4A">https://www.youtube.com/channel/UCg6gV_gdfc188HZdN8LUx4A</a></p>
</li>
<li>
<p>Book: <a href="https://www.amazon.com/Breaking-Step-Step-Starting-Information-ebook/dp/B07N15GTPC/">https://www.amazon.com/Breaking-Step-Step-Starting-Information-ebook/dp/B07N15GTPC/</a></p>
</li>
</ul><br/><p>See <a href="https://omnystudio.com/listener">omnystudio.com/listener</a> for privacy information.</p><p>Mentioned in this episode:</p><p><a href="https://getting-into-infosec.captivate.fm/stayintouch">Stay In Touch</a></p>]]></content:encoded><link><![CDATA[https://getting-into-infosec.captivate.fm/episode/infosteph-from-journalism-to-it-support-to-security-analyst]]></link><guid isPermaLink="false">4a33ee7d-161b-4172-9b3f-22822f171347</guid><itunes:image href="https://artwork.captivate.fm/0a22d598-1c94-4cd7-8c14-57b97e85b6c8/image.jpg"/><dc:creator><![CDATA[Ayman Elsawah (@coffeewithayman)]]></dc:creator><pubDate>Tue, 18 Dec 2018 18:57:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/91ce000e-0591-4fe7-9c7a-2f2d8c7d71dc/audio.mp3" length="51953079" type="audio/mpeg"/><itunes:duration>54:07</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>10</itunes:episode><podcast:episode>10</podcast:episode><itunes:summary>Steph is brand new to the infosec field! We go over her interesting and eventful path into Information Security, reflections on her role today, and some really interesting war stories!</itunes:summary><itunes:author>Ayman Elsawah (@coffeewithayman)</itunes:author></item><item><title>Virtual Kyle Kennedy - Stories, not resumes: Breaking educational and other barriers in cybersecurity</title><itunes:title>Virtual Kyle Kennedy - Stories, not resumes: Breaking educational and other barriers in cybersecurity</itunes:title><description><![CDATA[<p>Today's episode is a reading of an amazing written by Kyle Kennedy, president of brainbabe.org. The reading is performed by Allison, an IBM Watson personality. I also go through some recent resources discovered to help you on your journey to a Career in Infosec.</p>
<p><strong>BIO:</strong></p>
<p>Kyle F. Kennedy is a social cybersecurity expert and president of brainbabe.org. His organization provides foundational soft-skills training for a small fee (supported by corporation donations) and plans to launch soft-skill Masterclasses in 2019. They helped organize an event called Day of Shecurity for women of diverse backgrounds to have one day of learning: tech/ hard skills, soft skills. They had opportunities for mentorship and guidance. Day of Shecurity was FREE to attendees!</p>
<p><strong>Links:</strong></p>
<ul>
<li><a href="https://securitycurrent.com/stories-not-resumes-breaking-educational-and-other-barriers-in-cybersecurity/">Article: Stories, not resumes: Breaking educational and other barriers in cybersecurity</a></li>
<li><a href="https://www.google.com/search?q=cybersecurity&amp;tbm=isch">Google Image Search for "cybersecurity"</a></li>
<li><a href="https://www.isc2.org/Certifications/Associate">Associate of (ISC)&sup2;</a></li>
<li><a href="https://www.youtube.com/watch?v=8LF96Oq_pgo">Adrian Kaylor's talk "Sales Engineering and getting into infosec"</a></li>
<li><a href="https://www.joesecurity.org/">https://www.joesecurity.org/</a></li>
<li><a href="http://flaws2.cloud">Flaws2</a></li>
<li><a href="https://www.ccsf.edu/en/educational-programs/cte/ict.html">City College of SF Cybersecurity Program</a></li>
<li><a href="https://www.ccsf.edu/en/educational-programs/cte/earn_and_learn/apprenticeship_and_preparation/cyber_security.html">CCSF Information Security (Cybersecurity) Analyst Apprenticeship</a></li>
<li><a href="https://samsclass.info/">Sam Bowne's Classes</a></li>
<li><a href="https://gist.github.com/C8H10N4OO/920b4a70ed3e5a78902ef650ca3076d4">Article in IBM Watson's Expressive SSML used on the show</a></li>
<li>Intro/Outro Music: <a href="https://trash80.com/#/content/133/weeklybeats-2012-week5">Cascadia</a> by <a href="https://trash80.com/">Trash80</a></li>
</ul><br/>
<p><strong>Full Text of Article:</strong></p>
<p>When you search for images under the key word &ldquo;cybersecurity,&rdquo; a familiar shot always turns up: a guy wearing a hoodie, operating in a dark room, fingers on a keyboard.</p>
<p>I&rsquo;d like to replace that image with&hellip;anything. To be a cybersecurity professional, you can be anything. And anyone.</p>
<p>We&rsquo;ve heard the statistics. There is currently a human capital crisis, with 1.5 million cybersecurity jobs available and no takers. The number is projected to balloon to 3.2 million by 2021.</p>
<p>But who exactly are these cybersecurity professionals we are looking for?</p>
<p>For so long, we have had our own definition of who can fit that talent. A good cybersecurity professional has to have a computer science degree. They must have solid professional background. They have to be male. This pattern of defining success has led us to the shortage we are experiencing today. It&rsquo;s kind of like insanity, really: Doing the same thing over and over and expecting different results.</p>
<p>What really makes up a good professional? Every human being brings a different experience. You need critical thinking and creative thinking, both. A variety of educational, ethnic, geographical, backgrounds.</p>
<p>For example, cybersecurity is not the obvious career path for someone with a biology degree; however, a biology major might help throw a new perspective on cybersecurity given that advancements of technology will eventually interface with the human body organically creating a scary threat landscape.</p>
<p>Often too we talk about cybersecurity in the context of oil and gas, or transport, or finance. Cybersecurity today and going forward, is a...]]></description><content:encoded><![CDATA[<p>Today's episode is a reading of an amazing written by Kyle Kennedy, president of brainbabe.org. The reading is performed by Allison, an IBM Watson personality. I also go through some recent resources discovered to help you on your journey to a Career in Infosec.</p>
<p><strong>BIO:</strong></p>
<p>Kyle F. Kennedy is a social cybersecurity expert and president of brainbabe.org. His organization provides foundational soft-skills training for a small fee (supported by corporation donations) and plans to launch soft-skill Masterclasses in 2019. They helped organize an event called Day of Shecurity for women of diverse backgrounds to have one day of learning: tech/ hard skills, soft skills. They had opportunities for mentorship and guidance. Day of Shecurity was FREE to attendees!</p>
<p><strong>Links:</strong></p>
<ul>
<li><a href="https://securitycurrent.com/stories-not-resumes-breaking-educational-and-other-barriers-in-cybersecurity/">Article: Stories, not resumes: Breaking educational and other barriers in cybersecurity</a></li>
<li><a href="https://www.google.com/search?q=cybersecurity&amp;tbm=isch">Google Image Search for "cybersecurity"</a></li>
<li><a href="https://www.isc2.org/Certifications/Associate">Associate of (ISC)&sup2;</a></li>
<li><a href="https://www.youtube.com/watch?v=8LF96Oq_pgo">Adrian Kaylor's talk "Sales Engineering and getting into infosec"</a></li>
<li><a href="https://www.joesecurity.org/">https://www.joesecurity.org/</a></li>
<li><a href="http://flaws2.cloud">Flaws2</a></li>
<li><a href="https://www.ccsf.edu/en/educational-programs/cte/ict.html">City College of SF Cybersecurity Program</a></li>
<li><a href="https://www.ccsf.edu/en/educational-programs/cte/earn_and_learn/apprenticeship_and_preparation/cyber_security.html">CCSF Information Security (Cybersecurity) Analyst Apprenticeship</a></li>
<li><a href="https://samsclass.info/">Sam Bowne's Classes</a></li>
<li><a href="https://gist.github.com/C8H10N4OO/920b4a70ed3e5a78902ef650ca3076d4">Article in IBM Watson's Expressive SSML used on the show</a></li>
<li>Intro/Outro Music: <a href="https://trash80.com/#/content/133/weeklybeats-2012-week5">Cascadia</a> by <a href="https://trash80.com/">Trash80</a></li>
</ul><br/>
<p><strong>Full Text of Article:</strong></p>
<p>When you search for images under the key word &ldquo;cybersecurity,&rdquo; a familiar shot always turns up: a guy wearing a hoodie, operating in a dark room, fingers on a keyboard.</p>
<p>I&rsquo;d like to replace that image with&hellip;anything. To be a cybersecurity professional, you can be anything. And anyone.</p>
<p>We&rsquo;ve heard the statistics. There is currently a human capital crisis, with 1.5 million cybersecurity jobs available and no takers. The number is projected to balloon to 3.2 million by 2021.</p>
<p>But who exactly are these cybersecurity professionals we are looking for?</p>
<p>For so long, we have had our own definition of who can fit that talent. A good cybersecurity professional has to have a computer science degree. They must have solid professional background. They have to be male. This pattern of defining success has led us to the shortage we are experiencing today. It&rsquo;s kind of like insanity, really: Doing the same thing over and over and expecting different results.</p>
<p>What really makes up a good professional? Every human being brings a different experience. You need critical thinking and creative thinking, both. A variety of educational, ethnic, geographical, backgrounds.</p>
<p>For example, cybersecurity is not the obvious career path for someone with a biology degree; however, a biology major might help throw a new perspective on cybersecurity given that advancements of technology will eventually interface with the human body organically creating a scary threat landscape.</p>
<p>Often too we talk about cybersecurity in the context of oil and gas, or transport, or finance. Cybersecurity today and going forward, is a horizontal across every industry, as opposed to just being by itself.</p>
<p>Every industry needs cybersecurity professionals. People from other disciplines could provide their own perspectives and add value to how the job is done. For example, some of the best cybersecurity communicators otherwise known as &ldquo;Social Engineers&rdquo;, I know are drama majors, communication majors and liberal arts majors.</p>
<p>Why are soft skills critical? The risks here are complex. If these risks are not articulated in a business language, such that executives are not able to grasp their importance, then what you will have as a result are cyber policies, created from the ivory tower, which everyone must follow, and which would inhibit the business instead of enabling it.</p>
<p>If cybersecurity becomes more inclusive instead of exclusive, then we will be all the more superior to the attackers. As it is, it&rsquo;s the enemy who are inclusive. They don&rsquo;t have any requirement that hackers should have this or that degree or should have attended an Ivy League school. Most hackers are self-taught, and when something sparks their interest, they go online. They read. Nobody tells them they could not do it because they are not a good fit.</p>
<p>Initial strides</p>
<p>Foremost, before anything can be done, there must be an acknowledgment of the current situation and the need to be more welcoming. Business leaders and decision-makers must recognize the unconscious bias that they have. They have to understand that creating positive disruption and changing patterns are a business differentiator.</p>
<p>My organization is active in our advocacy for inclusion in cybersecurity, specifically for women. We have been speaking to organizations on positive disruption. A good way to create action is through regional events and grassroots involvement. We bring the community together, and it is these communities that conduct classes and organize meet-ups and training courses.</p>
<p>We did this in reaction to the more established cybersecurity conferences that present numerous barriers to entry, and which are more for senior professionals. Women may not have the luxury of being able to spring for the travel, or leave their homes for days at a time, and perhaps find childcare for the time they are away.</p>
<p>ISC2 also now has an associate certification, where an individual can take the certification examination without the work experience; providing an opportunity for employers to recognize &amp; support candidates entering or transitioning to the cybersecurity industry.</p>
<p>Personal reasons</p>
<p>My passion for diversity in cybersecurity is driven by several things.</p>
<p>First, given my degree in sociology, I must have had a hundred interviews before landing on a job in technology, even though I knew a lot about it &ndash; it had been a hobby for years &mdash; and it was clear I was keenly interested and willing to learn. They said I was not the right fit because I did not have a technology degree; specifically, a computer science degree. Didn&rsquo;t matter that I could code in Assembler, BASIC, C, Cobol, Comal, Forth, Fortran, Logo, Pascal, PL/1 or Algol.</p>
<p>And I thought, if this could happen to me, a white male, think of all the others who could not break the barriers!</p>
<p>I ended up leading the engineering department of the first company that hired me.</p>
<p>And then I met my wife, who herself had to break barriers in IT because she was a woman. For example, during meetings, she was seen as more of an assistant rather than a peer, even though she was very technical.</p>
<p>My male colleagues initially said I was just on the bandwagon with my advocacy for women in cybersecurity. I said no. Men have to recognize that we have to be part of the solution, since many of the positions of senior leadership are occupied by men.</p>
<p>&lsquo;This is not my coffee&rsquo;</p>
<p>I have a good analogy for all this. Suppose you went to a Starbucks, and when your coffee is given to you, you see that it was not what you asked for.</p>
<p>For a moment you might think you might as well take it, because the barista probably knows what is good for you, more than you do.</p>
<p>But no &ndash; you renegotiate. The barista does not know any better. You then look for the manager to explain the mistake and to get the drink you want.</p>
<p>Empathy is what can truly enable us to understand that we need to change the status quo. Yes, I am male, I am white, but I know that my background is a lot different from that of my peers. Because of this, I am very empathetic in that I know there are institutionalized barriers. I should know &ndash; I have spent the past 25 years in security.</p>
<p>What should really matter is that there are many talented individuals capable of both critical and creative thinking. They may not come in the shape and size we have traditionally expected them to be, but they are interested. They are intelligent.</p>
<p>In the end, only three questions should matter to organizations when they decide on investing in somebody for a cybersecurity role: Do you have the brain? Are you passionate? Can you learn?</p>
<p>Kyle F. Kennedy is a social cybersecurity expert and president of brainbabe.org. His organization provides foundational soft-skills training for a small fee (supported by corporation donations) and plans to launch soft-skill Masterclasses in 2019.They helped organize an event called Day of Shecurity, for women of diverse backgrounds to have one day of learning: tech/ hard skills, soft skills. They had opportunities for mentorship and guidance. Day of Shecurity was FREE to attendees!</p><p>See <a href="https://omnystudio.com/listener">omnystudio.com/listener</a> for privacy information.</p><p>Mentioned in this episode:</p><p><a href="https://getting-into-infosec.captivate.fm/stayintouch">Stay In Touch</a></p>]]></content:encoded><link><![CDATA[https://getting-into-infosec.captivate.fm/episode/virtual-kyle-kennedy-stories-not-resumes-breaking-educational-and-other-barriers-in-cybersecurity]]></link><guid isPermaLink="false">96cb4cc0-c2b3-43ac-a376-903ae9b10885</guid><itunes:image href="https://artwork.captivate.fm/ffa3b02e-1fd0-4401-9ad6-bf787469883e/image.jpg"/><dc:creator><![CDATA[Ayman Elsawah (@coffeewithayman)]]></dc:creator><pubDate>Tue, 11 Dec 2018 08:05:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/d935d678-0f31-4943-9501-4100562c3dd8/audio.mp3" length="9088060" type="audio/mpeg"/><itunes:duration>09:28</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>9</itunes:episode><podcast:episode>9</podcast:episode><itunes:summary>Today&apos;s episode is a reading of an amazing written by Kyle Kennedy, president of brainbabe.org. The reading is performed by Allison, an IBM Watson personality. I also go through some recent resources discovered to help you on your journey to a Career in Infosec.</itunes:summary><itunes:author>Ayman Elsawah (@coffeewithayman)</itunes:author></item><item><title>Elvis Chan - From Making Computer Chips to FBI Supervisory Special Agent!</title><itunes:title>Elvis Chan - From Making Computer Chips to FBI Supervisory Special Agent!</itunes:title><description><![CDATA[<p>Elvis Chan is a Supervisory Special Agent Elvis Chan, who works cybersecurity matters for the FBI San Francisco Division. We discuss how we got into the FBI, Life in the FBI Cybersecurity Division, and how to get involved.</p>
<p>The FBI is always looking for qualified applications for Special Agent and professional staff positions. Please see https://www.fbijobs.gov/ for more details.</p>
<p><strong>Notes:</strong></p>
<ul>
<li>There are three main roles in CyberSecurity at the FBI:
<ul>
<li>Special Agent (Gun Carrying Badge)</li>
<li>Intelligence Analyst</li>
<li>Computer Scientist</li>
</ul><br/>
</li>
<li>It may be quiet on the outside, but you can bet the FBI is hard at work on the inside.</li>
<li>Protection of the recent elections was discussed. The sheer number of people involved in protecting the elections from foreign actors couldn't be enumerated. Both the public sector and private sector are involved.</li>
<li>In an incident response, there is often coordination with FBI headquarters and sometimes other 3 letter agencies.</li>
<li>FBI San Francisco was the squad of record for investigating the 2014 Yahoo hack.</li>
<li>Elvis goes into detail explaining more about Russian Hacking and how the&nbsp;<a href="https://en.wikipedia.org/wiki/Federal_Security_Service">FSB</a>&nbsp;culture works.</li>
<li>Placement in the FBI is based on a ranking system.</li>
</ul><br/>
<p><strong>Quotes:</strong></p>
<ul>
<li>"There are a LOT of things behind the scenes I can't talk about."</li>
<li>"If you see in the news that there is a hack, you can be sure that there is at least one, maybe two, maybe several, office mobilized to figure out what the heck happened."</li>
<li>"On a regular day, I would love to just go through my email and have the scheduled meetings I'm gonna have."</li>
<li>"Why are the Russians coming after us..."</li>
<li>"Whatever happens to you... 'The Need of the Bureau'"</li>
<li>"My current job, despite all the paperwork and meeting I don't want to go to is a 10 out of 10!"</li>
<li>"People would not believe some of the stuff that we've seen or that we've gone through. They would make the worst movie plot because they would be so unbelievable!"</li>
</ul><br/>
<p><strong>Links:</strong></p>
<ul>
<li><a href="https://www.fbijobs.gov">FBI Jobs</a>: https://www.fbijobs.gov</li>
<li><a href="https://www.justice.gov/opa/pr/us-charges-russian-fsb-officers-and-their-criminal-conspirators-hacking-yahoo-and-millions">2014 Yahoo Hack</a>: https://www.justice.gov/opa/pr/us-charges-russian-fsb-officers-and-their-criminal-conspirators-hacking-yahoo-and-millions</li>
<li><a href="https://en.wikipedia.org/wiki/Federal_Security_Service">FSB</a>: https://en.wikipedia.org/wiki/Federal_Security_Service</li>
<li><a href="https://www.infragard.org/">InfraGard</a>: https://www.infragard.org/</li>
<li><a href="https://www.fbi.gov/contact-us/field-offices">FBI Field Offices</a>: https://www.fbi.gov/contact-us/field-offices</li>
</ul><br/><p>See <a href="https://omnystudio.com/listener">omnystudio.com/listener</a> for privacy information.</p><p>Mentioned in this episode:</p><p><a href="https://getting-into-infosec.captivate.fm/stayintouch">Stay In Touch</a></p>]]></description><content:encoded><![CDATA[<p>Elvis Chan is a Supervisory Special Agent Elvis Chan, who works cybersecurity matters for the FBI San Francisco Division. We discuss how we got into the FBI, Life in the FBI Cybersecurity Division, and how to get involved.</p>
<p>The FBI is always looking for qualified applications for Special Agent and professional staff positions. Please see https://www.fbijobs.gov/ for more details.</p>
<p><strong>Notes:</strong></p>
<ul>
<li>There are three main roles in CyberSecurity at the FBI:
<ul>
<li>Special Agent (Gun Carrying Badge)</li>
<li>Intelligence Analyst</li>
<li>Computer Scientist</li>
</ul><br/>
</li>
<li>It may be quiet on the outside, but you can bet the FBI is hard at work on the inside.</li>
<li>Protection of the recent elections was discussed. The sheer number of people involved in protecting the elections from foreign actors couldn't be enumerated. Both the public sector and private sector are involved.</li>
<li>In an incident response, there is often coordination with FBI headquarters and sometimes other 3 letter agencies.</li>
<li>FBI San Francisco was the squad of record for investigating the 2014 Yahoo hack.</li>
<li>Elvis goes into detail explaining more about Russian Hacking and how the&nbsp;<a href="https://en.wikipedia.org/wiki/Federal_Security_Service">FSB</a>&nbsp;culture works.</li>
<li>Placement in the FBI is based on a ranking system.</li>
</ul><br/>
<p><strong>Quotes:</strong></p>
<ul>
<li>"There are a LOT of things behind the scenes I can't talk about."</li>
<li>"If you see in the news that there is a hack, you can be sure that there is at least one, maybe two, maybe several, office mobilized to figure out what the heck happened."</li>
<li>"On a regular day, I would love to just go through my email and have the scheduled meetings I'm gonna have."</li>
<li>"Why are the Russians coming after us..."</li>
<li>"Whatever happens to you... 'The Need of the Bureau'"</li>
<li>"My current job, despite all the paperwork and meeting I don't want to go to is a 10 out of 10!"</li>
<li>"People would not believe some of the stuff that we've seen or that we've gone through. They would make the worst movie plot because they would be so unbelievable!"</li>
</ul><br/>
<p><strong>Links:</strong></p>
<ul>
<li><a href="https://www.fbijobs.gov">FBI Jobs</a>: https://www.fbijobs.gov</li>
<li><a href="https://www.justice.gov/opa/pr/us-charges-russian-fsb-officers-and-their-criminal-conspirators-hacking-yahoo-and-millions">2014 Yahoo Hack</a>: https://www.justice.gov/opa/pr/us-charges-russian-fsb-officers-and-their-criminal-conspirators-hacking-yahoo-and-millions</li>
<li><a href="https://en.wikipedia.org/wiki/Federal_Security_Service">FSB</a>: https://en.wikipedia.org/wiki/Federal_Security_Service</li>
<li><a href="https://www.infragard.org/">InfraGard</a>: https://www.infragard.org/</li>
<li><a href="https://www.fbi.gov/contact-us/field-offices">FBI Field Offices</a>: https://www.fbi.gov/contact-us/field-offices</li>
</ul><br/><p>See <a href="https://omnystudio.com/listener">omnystudio.com/listener</a> for privacy information.</p><p>Mentioned in this episode:</p><p><a href="https://getting-into-infosec.captivate.fm/stayintouch">Stay In Touch</a></p>]]></content:encoded><link><![CDATA[https://getting-into-infosec.captivate.fm/episode/elvis-chan-from-making-computer-chips-to-fbi-supervisory-special-agent]]></link><guid isPermaLink="false">9d362392-666e-40df-b431-c85c5b2aefee</guid><itunes:image href="https://artwork.captivate.fm/32b704fe-df90-4dc6-8966-f25b331901bc/image.jpg"/><dc:creator><![CDATA[Ayman Elsawah (@coffeewithayman)]]></dc:creator><pubDate>Tue, 04 Dec 2018 20:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/c317c11b-249a-4716-89be-50ca0db6ae12/audio.mp3" length="34563481" type="audio/mpeg"/><itunes:duration>36:00</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>8</itunes:episode><podcast:episode>8</podcast:episode><itunes:summary>Elvis Chan is a Supervisory Special Agent Elvis Chan, who works cyber security matters for the FBI San Francisco Division. We discuss how we got into the FBI, Life in the FBI CyberSecurity Division, and how to get involved.</itunes:summary><itunes:author>Ayman Elsawah (@coffeewithayman)</itunes:author></item><item><title>Clay Wells - From SysAdmin to Security Architect to Con Organizer!</title><itunes:title>Clay Wells - From SysAdmin to Security Architect to Con Organizer!</itunes:title><description><![CDATA[<p>Clay Wells has been living in kernel/userland since Red Hat 4.0 Colgate. Worklife has primarily been in academia and has included programming, system administration, and information security. He's a point of contact for the DC215 group and one of the Blue Team Village coordinators at DEF CON. He also created unofficial CTF challenges for local hacker cons and organizers for the first annual WOPR Summit this March 2019 in Atlantic City.</p>
<p>Clay, a security architect, musician, Defcon Blue Team Village Co-Organizer, and organizer of the first annual WOPR Summit, shares some really insightful tips on making it Information Security, as well as a fascinating recent war story.</p>
<p><a href="https://www.woprsummit.org/">WOPR Summit</a> is March 1st, 2019, in Atlantic City!</p>
<p><strong>Quotes:</strong></p>
<ul>
<li>
<p>"My heart was racing... that was a huge rush, and that's when I was like yea... blue side F*** rocks!!"</p>
</li>
<li>
<p>"Take a holistic approach to InfoSec, dive into the culture, different cons, music, people...volunteer, get out, get involved."</p>
</li>
<li>
<p>"Learn a little about everything, then find what really interests you... and go for it!"</p>
</li>
<li>
<p>"It's great to apt-get stuff... but try compiling a custom Linux kernel."</p>
</li>
<li>
<p>"I'm a strong believer in embracing that creative side."</p>
</li>
<li>
<p>"[Blue Team] certainly hasn't been the sexiest infosec job to have... yes, defense is what people want... there's a lot of defense work out there."</p>
</li>
</ul><br/>
<p><strong>Links:</strong></p>
<ul>
<li>Clay Wells on Twitter: <a href="https://twitter.com/ttheveii0x">https://twitter.com/ttheveii0x</a></li>
<li>Clay Wells on LinkedIn: <a href="https://www.linkedin.com/in/clayball/">https://www.linkedin.com/in/clayball/</a></li>
<li>Clay Wells Blog: <a href="http://www.cwells.org/">http://www.cwells.org/</a></li>
<li><a href="https://www.woprsummit.org/"></a><a href="https://www.woprsummit.org/">WOPR Summit 2019:&nbsp;</a><a href="https://www.woprsummit.org/">https://www.woprsummit.org/</a></li>
<li><a href="https://static1.squarespace.com/static/5b81b8f745776e48dcfb884d/t/5ba666dbf4e1fc68321a7a27/1537631964367/wopr-summit-2019-sponsor-prospectus.pdf">WOPR Summit Sponsorhip Prospectus</a>: https://static1.squarespace.com/static/5b81b8f745776e48dcfb884d/t/5ba666dbf4e1fc68321a7a27/1537631964367/wopr-summit-2019-sponsor-prospectus.pdf</li>
<li><a href="https://blueteamvillage.org/">DEF CON Blue Team Village</a>: https://blueteamvillage.org/</li>
<li><a href="https://opensoc.io/">Opensoc</a> by <a href="https://reconinfosec.com/">Recon Infosec:</a> https://opensoc.io/</li>
<li>Recon Infosec: https://reconinfosec.com/</li>
<li><a href="http://bsidesdc.org/">BsidesDC</a>: http://bsidesdc.org/</li>
<li><a href="https://www.graylog.org/">Graylog</a>: https://www.graylog.org/</li>
<li><a href="https://www.elastic.co/products/kibana">Kibana</a>: https://www.elastic.co/products/kibana</li>
<li><a href="https://hope.net/">H.O.P.E Conference</a>: https://hope.net/</li>
<li><a href="https://nostarch.com/">No Starch Press</a>: https://nostarch.com/</li>
<li><a href="https://soundcloud.com/clayball/0x41-2-version-b">Outro Music by Clay</a>: https://soundcloud.com/clayball/0x41-2-version-b</li>
</ul><br/><p>See <a href="https://omnystudio.com/listener">omnystudio.com/listener</a> for privacy information.</p><p>Mentioned in this episode:</p><p><a href="https://getting-into-infosec.captivate.fm/stayintouch">Stay In Touch</a></p>]]></description><content:encoded><![CDATA[<p>Clay Wells has been living in kernel/userland since Red Hat 4.0 Colgate. Worklife has primarily been in academia and has included programming, system administration, and information security. He's a point of contact for the DC215 group and one of the Blue Team Village coordinators at DEF CON. He also created unofficial CTF challenges for local hacker cons and organizers for the first annual WOPR Summit this March 2019 in Atlantic City.</p>
<p>Clay, a security architect, musician, Defcon Blue Team Village Co-Organizer, and organizer of the first annual WOPR Summit, shares some really insightful tips on making it Information Security, as well as a fascinating recent war story.</p>
<p><a href="https://www.woprsummit.org/">WOPR Summit</a> is March 1st, 2019, in Atlantic City!</p>
<p><strong>Quotes:</strong></p>
<ul>
<li>
<p>"My heart was racing... that was a huge rush, and that's when I was like yea... blue side F*** rocks!!"</p>
</li>
<li>
<p>"Take a holistic approach to InfoSec, dive into the culture, different cons, music, people...volunteer, get out, get involved."</p>
</li>
<li>
<p>"Learn a little about everything, then find what really interests you... and go for it!"</p>
</li>
<li>
<p>"It's great to apt-get stuff... but try compiling a custom Linux kernel."</p>
</li>
<li>
<p>"I'm a strong believer in embracing that creative side."</p>
</li>
<li>
<p>"[Blue Team] certainly hasn't been the sexiest infosec job to have... yes, defense is what people want... there's a lot of defense work out there."</p>
</li>
</ul><br/>
<p><strong>Links:</strong></p>
<ul>
<li>Clay Wells on Twitter: <a href="https://twitter.com/ttheveii0x">https://twitter.com/ttheveii0x</a></li>
<li>Clay Wells on LinkedIn: <a href="https://www.linkedin.com/in/clayball/">https://www.linkedin.com/in/clayball/</a></li>
<li>Clay Wells Blog: <a href="http://www.cwells.org/">http://www.cwells.org/</a></li>
<li><a href="https://www.woprsummit.org/"></a><a href="https://www.woprsummit.org/">WOPR Summit 2019:&nbsp;</a><a href="https://www.woprsummit.org/">https://www.woprsummit.org/</a></li>
<li><a href="https://static1.squarespace.com/static/5b81b8f745776e48dcfb884d/t/5ba666dbf4e1fc68321a7a27/1537631964367/wopr-summit-2019-sponsor-prospectus.pdf">WOPR Summit Sponsorhip Prospectus</a>: https://static1.squarespace.com/static/5b81b8f745776e48dcfb884d/t/5ba666dbf4e1fc68321a7a27/1537631964367/wopr-summit-2019-sponsor-prospectus.pdf</li>
<li><a href="https://blueteamvillage.org/">DEF CON Blue Team Village</a>: https://blueteamvillage.org/</li>
<li><a href="https://opensoc.io/">Opensoc</a> by <a href="https://reconinfosec.com/">Recon Infosec:</a> https://opensoc.io/</li>
<li>Recon Infosec: https://reconinfosec.com/</li>
<li><a href="http://bsidesdc.org/">BsidesDC</a>: http://bsidesdc.org/</li>
<li><a href="https://www.graylog.org/">Graylog</a>: https://www.graylog.org/</li>
<li><a href="https://www.elastic.co/products/kibana">Kibana</a>: https://www.elastic.co/products/kibana</li>
<li><a href="https://hope.net/">H.O.P.E Conference</a>: https://hope.net/</li>
<li><a href="https://nostarch.com/">No Starch Press</a>: https://nostarch.com/</li>
<li><a href="https://soundcloud.com/clayball/0x41-2-version-b">Outro Music by Clay</a>: https://soundcloud.com/clayball/0x41-2-version-b</li>
</ul><br/><p>See <a href="https://omnystudio.com/listener">omnystudio.com/listener</a> for privacy information.</p><p>Mentioned in this episode:</p><p><a href="https://getting-into-infosec.captivate.fm/stayintouch">Stay In Touch</a></p>]]></content:encoded><link><![CDATA[https://getting-into-infosec.captivate.fm/episode/clay-wells-from-sysadmin-to-security-architect-to-con-organizer]]></link><guid isPermaLink="false">169ba373-b477-4a7e-a89d-b8b57eddf0a7</guid><itunes:image href="https://artwork.captivate.fm/8a6cff0d-536a-4508-933a-9e77cfa2447a/image.jpg"/><dc:creator><![CDATA[Ayman Elsawah (@coffeewithayman)]]></dc:creator><pubDate>Tue, 27 Nov 2018 09:05:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/9b4d9e97-223e-48a1-9f58-020e3e8b7554/audio.mp3" length="33527353" type="audio/mpeg"/><itunes:duration>34:55</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>7</itunes:episode><podcast:episode>7</podcast:episode><itunes:summary>Clay Wells ... Security Architect, Musician, Defcon Blue Team Village Co-Organizer, and organizer of the first annual WOPR  Summit. Clay shares some really insightful tips on making it Information Security, as well as a really interesting war story from recently. 

WOPR Summit is March 1st, 2019 in Atlantic City!</itunes:summary><itunes:author>Ayman Elsawah (@coffeewithayman)</itunes:author></item><item><title>BONUS: Robin Stuart - Road to Becoming a Cyber Crime Author</title><itunes:title>BONUS: Robin Stuart - Road to Becoming a Cyber Crime Author</itunes:title><description><![CDATA[<p>Robin Stuart is a debut author in cybercrime fiction with a short story called "SegFault" in the Sisters in Crime NorCal anthology<em> <a href="http://www.sincnorcal.org/wp/faultlines/">Fault Lines</a></em>, which is due in early 2019!!!</p>
<p><strong>Notes</strong></p>
<ul>
<li>Wrote her first full-length mystery in the mid-'90s!</li>
<li>Pitching is basically a job interview</li>
<li>Honing your pitch</li>
<li>You only get one shot at that first impression</li>
<li>She has a backlog of stories to tell... Stay Tuned!!! (<em>So Excited!</em>)</li>
</ul><br/>
<p><strong>Links</strong></p>
<ul>
<li><a href="http://newyorkpitchconference.com/"></a><a href="http://newyorkpitchconference.com/">The New York Pitch Fest:</a><a href="http://newyorkpitchconference.com/"> http://newyorkpitchconference.com/</a></li>
<li><a href="https://mysterywriters.org/">Mystery Writers</a>: https://mysterywriters.org/</li>
<li><a href="http://www.sincnorcal.org/"></a><a href="http://www.sincnorcal.org/">Sister in Crime Northern California Chapter:&nbsp;</a><a href="http://www.sincnorcal.org/">http://www.sincnorcal.org/</a></li>
<li><a href="http://talcottnotch.net/index.php/agents/paula-munier">Paula Munier</a>, Robin's Literary Agent: http://talcottnotch.net/index.php/agents/paula-munier</li>
<li>Robin Stuart Full Interview: <a href="https://gettingintoinfosec/robin-stuart-from-paralegal-to-malware-researcher-and-cyber-crime-author">https://gettingintoinfosec/robin-stuart-from-paralegal-to-malware-researcher-and-cyber-crime-author</a></li>
</ul><br/><p>See <a href="https://omnystudio.com/listener">omnystudio.com/listener</a> for privacy information.</p><p>Mentioned in this episode:</p><p><a href="https://getting-into-infosec.captivate.fm/stayintouch">Stay In Touch</a></p>]]></description><content:encoded><![CDATA[<p>Robin Stuart is a debut author in cybercrime fiction with a short story called "SegFault" in the Sisters in Crime NorCal anthology<em> <a href="http://www.sincnorcal.org/wp/faultlines/">Fault Lines</a></em>, which is due in early 2019!!!</p>
<p><strong>Notes</strong></p>
<ul>
<li>Wrote her first full-length mystery in the mid-'90s!</li>
<li>Pitching is basically a job interview</li>
<li>Honing your pitch</li>
<li>You only get one shot at that first impression</li>
<li>She has a backlog of stories to tell... Stay Tuned!!! (<em>So Excited!</em>)</li>
</ul><br/>
<p><strong>Links</strong></p>
<ul>
<li><a href="http://newyorkpitchconference.com/"></a><a href="http://newyorkpitchconference.com/">The New York Pitch Fest:</a><a href="http://newyorkpitchconference.com/"> http://newyorkpitchconference.com/</a></li>
<li><a href="https://mysterywriters.org/">Mystery Writers</a>: https://mysterywriters.org/</li>
<li><a href="http://www.sincnorcal.org/"></a><a href="http://www.sincnorcal.org/">Sister in Crime Northern California Chapter:&nbsp;</a><a href="http://www.sincnorcal.org/">http://www.sincnorcal.org/</a></li>
<li><a href="http://talcottnotch.net/index.php/agents/paula-munier">Paula Munier</a>, Robin's Literary Agent: http://talcottnotch.net/index.php/agents/paula-munier</li>
<li>Robin Stuart Full Interview: <a href="https://gettingintoinfosec/robin-stuart-from-paralegal-to-malware-researcher-and-cyber-crime-author">https://gettingintoinfosec/robin-stuart-from-paralegal-to-malware-researcher-and-cyber-crime-author</a></li>
</ul><br/><p>See <a href="https://omnystudio.com/listener">omnystudio.com/listener</a> for privacy information.</p><p>Mentioned in this episode:</p><p><a href="https://getting-into-infosec.captivate.fm/stayintouch">Stay In Touch</a></p>]]></content:encoded><link><![CDATA[https://getting-into-infosec.captivate.fm/episode/bonus-robin-stuart-road-to-becoming-a-cyber-crime-author]]></link><guid isPermaLink="false">c01f07fe-6668-42ef-963e-424e370da411</guid><itunes:image href="https://artwork.captivate.fm/5a241bdd-3343-4156-8b06-6de2773a464c/image.jpg"/><dc:creator><![CDATA[Ayman Elsawah (@coffeewithayman)]]></dc:creator><pubDate>Sun, 18 Nov 2018 05:08:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/7851ab83-2802-4f0b-9eab-abe6a0b0637c/audio.mp3" length="17869341" type="audio/mpeg"/><itunes:duration>18:37</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>bonus</itunes:episodeType><itunes:summary>Robin Stuart is a debut author in cyber crime fiction with a short story called &quot;SegFault&quot; in the Sisters in Crime NorCal anthology [Fault Lines][4] , which is due out in early 2019!!!</itunes:summary><itunes:author>Ayman Elsawah (@coffeewithayman)</itunes:author></item><item><title>Robin Stuart - From Paralegal to Malware Researcher (and Cyber Crime Author!)</title><itunes:title>Robin Stuart - From Paralegal to Malware Researcher (and Cyber Crime Author!)</itunes:title><description><![CDATA[<p>Robin Stuart started off as a paralegal until she was challenged one day to get her boss's password (<strong>hint</strong>: do not challenge Robin). Fast forward, she switched careers to technology but kept a lookout for a career in security.</p>
<p><strong>Bio</strong></p>
<p>Veteran cybercrime investigator and contributing author to the Handbook for Information Security by Wiley, Robin is a debut author in cybercrime fiction with a short story in the Sisters in Crime NorCal anthology<em> Fault Lines</em>, which is due out in early 2019.</p>
<p>She consults on all things cybersecurity for Fortune 100 companies, television shows, and media outlets, including BBC and NowThis News.</p>
<p>She was a significant contributor to the Tech Museum of Innovation's acclaimed Cyber Detectives interactive installation, one of the museum's most popular permanent exhibits, which earned praise from the Obama Administration.</p>
<p><strong>Notes</strong></p>
<ul>
<li>Combination of Enthusiasm and Perseverance</li>
<li>Creativity matters a lot!</li>
<li>Setting up a home lab to train</li>
<li>Robin's First "Hack"! EPIC!</li>
<li>There isn't a linear path into information security, no need for a degree necessarily</li>
</ul><br/>
<p><strong>Quotes</strong></p>
<ul>
<li>"[After] years of being a paralegal, I think like a lawyer and that's helped me very well"</li>
<li>"My Google works a little better than other people's Google."</li>
<li>Someone once asked Robin, "I've got an hour... can you teach me everything you know?"</li>
<li>"Taught myself Assembly by writing a program all in assembly, just to prove to myself that I understood it."</li>
</ul><br/>
<ul></ul><br/>
<p><strong>Links</strong></p>
<ul>
<li><a href="https://twitter.com/rcstuart">Robin Stuart on Twitter</a></li>
<li><a href="http://www.sincnorcal.org/wp/faultlines/">Robin's Upcoming CyberCrime Short Story</a></li>
<li><a href="http://www.robincstuart.com/">Robin's Twitter</a></li>
<li><a href="https://www.yearup.org/">Year Up Program</a></li>
<li><a href="https://www.lexisnexis.com">Lexis Nexus DB</a></li>
<li><a href="https://www.amazon.com/Shellcoders-Handbook-Discovering-Exploiting-Security/dp/047008023X">Shellcoder's Handbook</a></li>
<li><a href="https://www.wiley.com/WileyCDA/Section/id-131579.html">Information Security Handbook by Wiley</a></li>
<li><a href="https://www.amazon.com/Reversing-Secrets-Engineering-Eldad-Eilam/dp/0764574817/">Reversing</a></li>
<li><a href="https://www.amazon.com/Practical-Malware-Analysis-Hands-Dissecting/dp/1593272901/">Practical Malware Analysis</a></li>
<li><a href="https://www.audioblocks.com/stock-audio/feeling-ready-for-it-94173.html">Outro Music</a></li>
</ul><br/><p>See <a href="https://omnystudio.com/listener">omnystudio.com/listener</a> for privacy information.</p><p>Mentioned in this episode:</p><p><a href="https://getting-into-infosec.captivate.fm/stayintouch">Stay In Touch</a></p>]]></description><content:encoded><![CDATA[<p>Robin Stuart started off as a paralegal until she was challenged one day to get her boss's password (<strong>hint</strong>: do not challenge Robin). Fast forward, she switched careers to technology but kept a lookout for a career in security.</p>
<p><strong>Bio</strong></p>
<p>Veteran cybercrime investigator and contributing author to the Handbook for Information Security by Wiley, Robin is a debut author in cybercrime fiction with a short story in the Sisters in Crime NorCal anthology<em> Fault Lines</em>, which is due out in early 2019.</p>
<p>She consults on all things cybersecurity for Fortune 100 companies, television shows, and media outlets, including BBC and NowThis News.</p>
<p>She was a significant contributor to the Tech Museum of Innovation's acclaimed Cyber Detectives interactive installation, one of the museum's most popular permanent exhibits, which earned praise from the Obama Administration.</p>
<p><strong>Notes</strong></p>
<ul>
<li>Combination of Enthusiasm and Perseverance</li>
<li>Creativity matters a lot!</li>
<li>Setting up a home lab to train</li>
<li>Robin's First "Hack"! EPIC!</li>
<li>There isn't a linear path into information security, no need for a degree necessarily</li>
</ul><br/>
<p><strong>Quotes</strong></p>
<ul>
<li>"[After] years of being a paralegal, I think like a lawyer and that's helped me very well"</li>
<li>"My Google works a little better than other people's Google."</li>
<li>Someone once asked Robin, "I've got an hour... can you teach me everything you know?"</li>
<li>"Taught myself Assembly by writing a program all in assembly, just to prove to myself that I understood it."</li>
</ul><br/>
<ul></ul><br/>
<p><strong>Links</strong></p>
<ul>
<li><a href="https://twitter.com/rcstuart">Robin Stuart on Twitter</a></li>
<li><a href="http://www.sincnorcal.org/wp/faultlines/">Robin's Upcoming CyberCrime Short Story</a></li>
<li><a href="http://www.robincstuart.com/">Robin's Twitter</a></li>
<li><a href="https://www.yearup.org/">Year Up Program</a></li>
<li><a href="https://www.lexisnexis.com">Lexis Nexus DB</a></li>
<li><a href="https://www.amazon.com/Shellcoders-Handbook-Discovering-Exploiting-Security/dp/047008023X">Shellcoder's Handbook</a></li>
<li><a href="https://www.wiley.com/WileyCDA/Section/id-131579.html">Information Security Handbook by Wiley</a></li>
<li><a href="https://www.amazon.com/Reversing-Secrets-Engineering-Eldad-Eilam/dp/0764574817/">Reversing</a></li>
<li><a href="https://www.amazon.com/Practical-Malware-Analysis-Hands-Dissecting/dp/1593272901/">Practical Malware Analysis</a></li>
<li><a href="https://www.audioblocks.com/stock-audio/feeling-ready-for-it-94173.html">Outro Music</a></li>
</ul><br/><p>See <a href="https://omnystudio.com/listener">omnystudio.com/listener</a> for privacy information.</p><p>Mentioned in this episode:</p><p><a href="https://getting-into-infosec.captivate.fm/stayintouch">Stay In Touch</a></p>]]></content:encoded><link><![CDATA[https://getting-into-infosec.captivate.fm/episode/robin-stuart-from-paralegal-to-malware-researcher-and-cyber-crime-author]]></link><guid isPermaLink="false">590ebc3c-2460-45cc-ac17-c505912832d3</guid><itunes:image href="https://artwork.captivate.fm/23ed7645-f168-4d8c-9976-ef6d82961a30/image.jpg"/><dc:creator><![CDATA[Ayman Elsawah (@coffeewithayman)]]></dc:creator><pubDate>Tue, 13 Nov 2018 22:02:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/7e331c7d-1546-4837-8bdf-0af6af7b8886/audio.mp3" length="39995701" type="audio/mpeg"/><itunes:duration>41:40</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>6</itunes:episode><podcast:episode>6</podcast:episode><itunes:summary>Robin Stuart started off as a paralegal until she was challenged one day to get her boss&apos;s password. (Hint: Do not challenge Robin).  Fast forward she switched careers to Technology but always kept a lookout for a career in security. Oh... she&apos;s also a cyber-crime author!</itunes:summary><itunes:author>Ayman Elsawah (@coffeewithayman)</itunes:author></item><item><title>Rob Carson - From USMC Infantry Officer to Information Security Officer</title><itunes:title>Rob Carson - From USMC Infantry Officer to Information Security Officer</itunes:title><description><![CDATA[<p><strong>Speaker Bio</strong></p>
<p>Rob Carson, the founder of Semper Sec, knows how to simplify the problem and deliver solutions.</p>
<p>His clients base includes:</p>
<ul>
<li>Fortune 200 Companies</li>
<li>US Government Contractors</li>
<li>State and Local Governments</li>
<li>Fuel Retailers</li>
<li>Software and hardware manufacturers</li>
</ul><br/>
<p>His distinguished career includes service as a Marine Corps Infantry Officer, as well as leading roles in IT and Security. Before devoting his work full-time to facilitating his client's success, he built highly successful information security programs for ISO 27001:2005/2013, PCI, HIPAA, NIST 800-171, GDPR. He also volunteers his time as the Chief Security Officer for BSIDES Las Vegas, a non-profit educational organization designed to advance the body of Information Security.</p>
<p><strong>Episode Highlights</strong></p>
<ul>
<li>Matt reveals how much he made when he got out of the Marines</li>
<li>Matt hilariously talks about the nuances he had to deal with when going to the private sector:</li>
<li>Not saying "Sir" and "Madame"</li>
<li>Figuring out what to wear</li>
<li>How being early is too early</li>
</ul><br/>
<p><strong>Quotes</strong></p>
<ul>
<li>"I wasn't getting shot at... I was working in climate control, you know, so people be all stressed out, and I was like, 'Well, no one's going to die.'"</li>
<li>"I like to call myself a 'lessons learned enthusiast.'"</li>
<li>"The hardest job you'll ever get in infosec is that first step in."</li>
<li>"A first sergeant told me your hobbies should reflect part of your career."</li>
<li>"You can be outside the box, but you need to stay inside the room."</li>
</ul><br/>
<p><strong>Links</strong></p>
<ul>
<li>Sempersec: https://sempersec.com/</li>
<li>Rob Carson's LinkedIN Profile: https://www.linkedin.com/in/robcarson1/</li>
</ul><br/><p>See <a href="https://omnystudio.com/listener">omnystudio.com/listener</a> for privacy information.</p><p>Mentioned in this episode:</p><p><a href="https://getting-into-infosec.captivate.fm/stayintouch">Stay In Touch</a></p>]]></description><content:encoded><![CDATA[<p><strong>Speaker Bio</strong></p>
<p>Rob Carson, the founder of Semper Sec, knows how to simplify the problem and deliver solutions.</p>
<p>His clients base includes:</p>
<ul>
<li>Fortune 200 Companies</li>
<li>US Government Contractors</li>
<li>State and Local Governments</li>
<li>Fuel Retailers</li>
<li>Software and hardware manufacturers</li>
</ul><br/>
<p>His distinguished career includes service as a Marine Corps Infantry Officer, as well as leading roles in IT and Security. Before devoting his work full-time to facilitating his client's success, he built highly successful information security programs for ISO 27001:2005/2013, PCI, HIPAA, NIST 800-171, GDPR. He also volunteers his time as the Chief Security Officer for BSIDES Las Vegas, a non-profit educational organization designed to advance the body of Information Security.</p>
<p><strong>Episode Highlights</strong></p>
<ul>
<li>Matt reveals how much he made when he got out of the Marines</li>
<li>Matt hilariously talks about the nuances he had to deal with when going to the private sector:</li>
<li>Not saying "Sir" and "Madame"</li>
<li>Figuring out what to wear</li>
<li>How being early is too early</li>
</ul><br/>
<p><strong>Quotes</strong></p>
<ul>
<li>"I wasn't getting shot at... I was working in climate control, you know, so people be all stressed out, and I was like, 'Well, no one's going to die.'"</li>
<li>"I like to call myself a 'lessons learned enthusiast.'"</li>
<li>"The hardest job you'll ever get in infosec is that first step in."</li>
<li>"A first sergeant told me your hobbies should reflect part of your career."</li>
<li>"You can be outside the box, but you need to stay inside the room."</li>
</ul><br/>
<p><strong>Links</strong></p>
<ul>
<li>Sempersec: https://sempersec.com/</li>
<li>Rob Carson's LinkedIN Profile: https://www.linkedin.com/in/robcarson1/</li>
</ul><br/><p>See <a href="https://omnystudio.com/listener">omnystudio.com/listener</a> for privacy information.</p><p>Mentioned in this episode:</p><p><a href="https://getting-into-infosec.captivate.fm/stayintouch">Stay In Touch</a></p>]]></content:encoded><link><![CDATA[https://getting-into-infosec.captivate.fm/episode/rob-carson-from-usmc-infantry-officer-to-information-security-officer]]></link><guid isPermaLink="false">95d51d22-1d19-4d70-acc0-4183914edc34</guid><itunes:image href="https://artwork.captivate.fm/3af2ebc8-1f7b-4ed9-839d-da61e2c80bbc/image.jpg"/><dc:creator><![CDATA[Ayman Elsawah (@coffeewithayman)]]></dc:creator><pubDate>Tue, 06 Nov 2018 18:03:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/18c147d6-66fc-4bc0-b63f-abf179c34dc2/audio.mp3" length="31411649" type="audio/mpeg"/><itunes:duration>32:43</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>5</itunes:episode><podcast:episode>5</podcast:episode><itunes:summary>Rob is a former Marine Corps Infantry Officer who transitioned himself to an outstanding Information Security Officer in the private sector. He talks about the transition and all the nuances we in the private sector take for granted.</itunes:summary><itunes:author>Ayman Elsawah (@coffeewithayman)</itunes:author></item><item><title>Matt Toth - From Slinky Network Support Engineer to Security Sales Engineer</title><itunes:title>Matt Toth - From Slinky Network Support Engineer to Security Sales Engineer</itunes:title><description><![CDATA[<p>Matt Toth is a Senior Security and Veteran Sales Engineer. Having collaborated with the Department of Defense on War Games and advised senior leaders on possible cyber threats, Matt has two decades of IT experience with a focus on cybersecurity. With a passion for security, Matt is deeply engaged with the community to educate and prepare the next generation of cyber professionals.</p>
<p>On top of that, he&rsquo;s a good friend of mine in the industry with solid advice for those looking for a career in Information Security.</p>
<p>In our chat, Matt breaks down a Sales Engineer&rsquo;s role, explains his love of conference badges, and gets philosophical on issues related to those trying to make it in the field.</p>
<p><strong>Episode Highlights</strong>:</p>
<ul>
<li>The jack-of-all-trades nature of Sales Engineer work</li>
<li>Matt describes one company&rsquo;s dishonest approach to &ldquo;AI&rdquo;</li>
<li>How a luxury car and stylish threads can make the wrong impression on your client</li>
<li>Con culture and breaking through the shyness barrier</li>
<li>Matt delves into #BadgeLife</li>
<li>The surprising accuracy of Hackers and Mr. Robot</li>
<li>How Matt&rsquo;s art school&rsquo;s aspirations shifted to IT</li>
<li>InfoSec wargames and the &ldquo;Russian nesting doll&rdquo; scenario Matt encountered working with a client</li>
<li>Why some companies prefer to live with a security problem rather than attempt to fix it</li>
<li><em>Lastly: Have you been keeping an ear out for my Easter eggs? Listen closely</em></li>
</ul><br/>
<p><strong>Quotes</strong>:</p>
<ul>
<li>&ldquo;I&rsquo;m here, the customer trusts me to be here, and I&rsquo;m gonna make sure that when they&rsquo;re done, they&rsquo;re happy with the situation so that they never come back and say, &lsquo;Hey dude, you screwed me over.&rsquo;&rdquo;</li>
<li>&ldquo;You have to understand that you&rsquo;re responsible for your own success. You can&rsquo;t hide because you do have a quota.&rdquo;</li>
<li>&ldquo;If you really don&rsquo;t like the technology you&rsquo;re dealing with, you&rsquo;re not going to sell it well.&rdquo;</li>
<li>&ldquo;It&rsquo;s awesome... [and iconic,] that soundtrack is still incredible! On the way out to BlackHat this year, I watched Hackers on the airplane, and it was freaking me out&hellip; all of the attacks&hellip; are real world attacks we&rsquo;re dealing with today still!&rdquo;</li>
<li>&ldquo;When you&rsquo;re meeting with your audience, understand who they are and understand what they expect.&rdquo;</li>
<li>&ldquo;&lsquo;Hi, I&rsquo;m Matt, and I&rsquo;m an InfoSec addict!&rsquo; <em>&lsquo;Hi Matt!&rsquo;</em>&rdquo;</li>
<li>&ldquo;If you&rsquo;re just getting into the industry, recognize that all of us have our skill gaps. There is no one who knows everything.&rdquo;</li>
<li>&ldquo;My thoughts on certs are, 'do you like to get paid?'&rdquo;</li>
<li>&ldquo;Most insider threats aren't malicious: they're just people trying to do their job and oftentimes working around the system to try to be more efficient.&rdquo;</li>
</ul><br/>
<p><strong>Links</strong>:</p>
<ul>
<li><a href="https://www.linkedin.com/in/matt-toth-68b7181/">Matt&rsquo;s LinkedIn</a></li>
<li><a href="https://twitter.com/willhackforfood">Matt&rsquo;s Twitter - @willhackforfood</a></li>
<li><a href="http://blog.hacktheplanet.org/">Matt&rsquo;s blog</a></li>
<li><a href="https://www.splunk.com/">Splunk</a></li>
<li><a href="https://en.wikipedia.org/wiki/William_Gibson">William Gibson</a> and <a href="https://en.wikipedia.org/wiki/Neuromancer">Neuromancer</a></li>
<li><a href="https://twitter.com/grifter801">Grifter</a> and <a href="https://www.csoonline.com/article/3227910/security/hackers-create-memorial-for-a-cockroach-named-trevor.html">#trevorforget</a></li>
<li><a href="https://www.derbycon.com/">Derbycon</a></li>
</ul><br/><p>See <a href="https://omnystudio.com/listener">omnystudio.com/listener</a> for privacy]]></description><content:encoded><![CDATA[<p>Matt Toth is a Senior Security and Veteran Sales Engineer. Having collaborated with the Department of Defense on War Games and advised senior leaders on possible cyber threats, Matt has two decades of IT experience with a focus on cybersecurity. With a passion for security, Matt is deeply engaged with the community to educate and prepare the next generation of cyber professionals.</p>
<p>On top of that, he&rsquo;s a good friend of mine in the industry with solid advice for those looking for a career in Information Security.</p>
<p>In our chat, Matt breaks down a Sales Engineer&rsquo;s role, explains his love of conference badges, and gets philosophical on issues related to those trying to make it in the field.</p>
<p><strong>Episode Highlights</strong>:</p>
<ul>
<li>The jack-of-all-trades nature of Sales Engineer work</li>
<li>Matt describes one company&rsquo;s dishonest approach to &ldquo;AI&rdquo;</li>
<li>How a luxury car and stylish threads can make the wrong impression on your client</li>
<li>Con culture and breaking through the shyness barrier</li>
<li>Matt delves into #BadgeLife</li>
<li>The surprising accuracy of Hackers and Mr. Robot</li>
<li>How Matt&rsquo;s art school&rsquo;s aspirations shifted to IT</li>
<li>InfoSec wargames and the &ldquo;Russian nesting doll&rdquo; scenario Matt encountered working with a client</li>
<li>Why some companies prefer to live with a security problem rather than attempt to fix it</li>
<li><em>Lastly: Have you been keeping an ear out for my Easter eggs? Listen closely</em></li>
</ul><br/>
<p><strong>Quotes</strong>:</p>
<ul>
<li>&ldquo;I&rsquo;m here, the customer trusts me to be here, and I&rsquo;m gonna make sure that when they&rsquo;re done, they&rsquo;re happy with the situation so that they never come back and say, &lsquo;Hey dude, you screwed me over.&rsquo;&rdquo;</li>
<li>&ldquo;You have to understand that you&rsquo;re responsible for your own success. You can&rsquo;t hide because you do have a quota.&rdquo;</li>
<li>&ldquo;If you really don&rsquo;t like the technology you&rsquo;re dealing with, you&rsquo;re not going to sell it well.&rdquo;</li>
<li>&ldquo;It&rsquo;s awesome... [and iconic,] that soundtrack is still incredible! On the way out to BlackHat this year, I watched Hackers on the airplane, and it was freaking me out&hellip; all of the attacks&hellip; are real world attacks we&rsquo;re dealing with today still!&rdquo;</li>
<li>&ldquo;When you&rsquo;re meeting with your audience, understand who they are and understand what they expect.&rdquo;</li>
<li>&ldquo;&lsquo;Hi, I&rsquo;m Matt, and I&rsquo;m an InfoSec addict!&rsquo; <em>&lsquo;Hi Matt!&rsquo;</em>&rdquo;</li>
<li>&ldquo;If you&rsquo;re just getting into the industry, recognize that all of us have our skill gaps. There is no one who knows everything.&rdquo;</li>
<li>&ldquo;My thoughts on certs are, 'do you like to get paid?'&rdquo;</li>
<li>&ldquo;Most insider threats aren't malicious: they're just people trying to do their job and oftentimes working around the system to try to be more efficient.&rdquo;</li>
</ul><br/>
<p><strong>Links</strong>:</p>
<ul>
<li><a href="https://www.linkedin.com/in/matt-toth-68b7181/">Matt&rsquo;s LinkedIn</a></li>
<li><a href="https://twitter.com/willhackforfood">Matt&rsquo;s Twitter - @willhackforfood</a></li>
<li><a href="http://blog.hacktheplanet.org/">Matt&rsquo;s blog</a></li>
<li><a href="https://www.splunk.com/">Splunk</a></li>
<li><a href="https://en.wikipedia.org/wiki/William_Gibson">William Gibson</a> and <a href="https://en.wikipedia.org/wiki/Neuromancer">Neuromancer</a></li>
<li><a href="https://twitter.com/grifter801">Grifter</a> and <a href="https://www.csoonline.com/article/3227910/security/hackers-create-memorial-for-a-cockroach-named-trevor.html">#trevorforget</a></li>
<li><a href="https://www.derbycon.com/">Derbycon</a></li>
</ul><br/><p>See <a href="https://omnystudio.com/listener">omnystudio.com/listener</a> for privacy information.</p><p>Mentioned in this episode:</p><p><a href="https://getting-into-infosec.captivate.fm/stayintouch">Stay In Touch</a></p>]]></content:encoded><link><![CDATA[https://getting-into-infosec.captivate.fm/episode/matt-toth-from-slinky-network-support-engineer-to-security-sales-engineer]]></link><guid isPermaLink="false">f7ff0bda-b342-47e8-ae80-bc13fb2f058c</guid><itunes:image href="https://artwork.captivate.fm/0028a23d-126f-4414-9019-3a22f381a793/image.jpg"/><dc:creator><![CDATA[Ayman Elsawah (@coffeewithayman)]]></dc:creator><pubDate>Tue, 30 Oct 2018 07:15:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/565fe769-9b90-4da2-925b-4f4c34f4ee61/audio.mp3" length="60279676" type="audio/mpeg"/><itunes:duration>01:02:47</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>4</itunes:episode><podcast:episode>4</podcast:episode><itunes:summary>Matt Toth is a Senior Security Engineer with over 20 years of experience in the Information Technology industry, with a focus on Cyber Security. Working with the US Department of Defense, he has led teams in CyberWar simulations, and has advised senior leadership on new attack vectors and threat actors. With a passion for security, Matt is deeply engaged with the community to educate and prepare the next generation of Cyber Professional. 

On top of that, he’s a good friend of mine in the industry with solid advice for those looking for a career in Information Security. 

In our chat, Matt breaks down a Sales Engineer’s role, explains his love of conference badges, and gets philosophical on issues related to those trying to make it in the field.</itunes:summary><itunes:author>Ayman Elsawah (@coffeewithayman)</itunes:author></item><item><title>Christina Hanson -  From HOA Manager to Headfirst Into InfoSec!</title><itunes:title>Christina Hanson -  From HOA Manager to Headfirst Into InfoSec!</itunes:title><description><![CDATA[<p>Christina Hanson is a security analyst working for Truvantis Cyber Security Consulting and one of my former boot camp students. She has extensive technical experience and a deep understanding of the collaborative nature of InfoSec, not to mention how women and other underrepresented groups in the community have a more difficult time navigating this industry due to institutional barriers.</p>
<p>In our discussion, Christina touches on the wide variety of resources and events that helped her enter information security, why teamwork is just as important as technical work, and why InfoSec's responsibilities will continue to grow in the near future.</p>
<p><strong>Episode Highlights</strong></p>
<ul>
<li>How Christina's aptitude for IT led her down the path to InfoSec</li>
<li>The "elective" course Christina took that turned out to be career-changing</li>
<li>Why cooperation and group work are so important in InfoSec</li>
<li>The "soft skills" needed to work in security</li>
<li>Infosec was not her 1st or 2nd career!</li>
<li>An overview of Christina's day at Truvantis and how she works with clients</li>
<li>Christina's experience at a SANS women's academy and the Day of Shecurity conference</li>
<li>Why the InfoSec industry needs contributions from people from all backgrounds and how it benefits from diversity in general</li>
<li>The increasing accessibility of conferences and other tech events for those who can't attend</li>
<li>InfoSec's important role as companies have more and more access to users' data</li>
</ul><br/>
<p><strong>Quotes</strong></p>
<ul>
<li>"I found that just the general atmosphere of security and the overall focus of what you're trying to accomplish was really helpful."</li>
<li>"Anything you're gonna do in security, you're gonna do as a team."</li>
<li>"Being open to learning new things is really important with this particular field."</li>
<li>"Even if I don't understand everything they're talking about, it gives me at least a start and a basic understanding that I can then research later."</li>
<li>"Being a professional in this field, it's so important that we are able to make other people safe."</li>
</ul><br/>
<p><strong>Links</strong>:</p>
<ul>
<li>Christina's LinkedIn: <a href="https://www.linkedin.com/in/christinahanson461/">https://www.linkedin.com/in/christinahanson461/</a></li>
<li>Day of Shecurity: <a href="https://www.dayofshecurity.com/">https://www.dayofshecurity.com/</a></li>
<li>SANS Women's Academy: <a href="https://www.sans.org/cyb">https://www.sans.org/cyb</a></li>
<li>Merritt College: <a href="http://www.merritt.edu/">http://www.merritt.edu/</a></li>
<li>Dr. Johannes Ullrich: <a href="https://twitter.com/johullrich">https://twitter.com/johullrich</a></li>
<li>SANS Daily Podcast: <a href="https://isc.sans.edu/podcast.html">https://isc.sans.edu/podcast.html</a></li>
<li>The Cyberwire Podcasts: <a href="https://isc.sans.edu/podcast.html">https://isc.sans.edu/podcast.html</a></li>
<li>OWASP: <a href="https://www.owasp.org">https://www.owasp.org</a></li>
<li>Amanda Rousseau (@malwareunicorn): <a href="https://twitter.com/malwareunicorn">https://twitter.com/malwareunicorn</a></li>
<li>Dead Drop SF: <a href="https://www.meetup.com/Dead-Drop-SF/">https://www.meetup.com/Dead-Drop-SF/</a></li>
</ul><br/><p>See <a href="https://omnystudio.com/listener">omnystudio.com/listener</a> for privacy information.</p><p>Mentioned in this episode:</p><p><a href="https://getting-into-infosec.captivate.fm/stayintouch">Stay In Touch</a></p>]]></description><content:encoded><![CDATA[<p>Christina Hanson is a security analyst working for Truvantis Cyber Security Consulting and one of my former boot camp students. She has extensive technical experience and a deep understanding of the collaborative nature of InfoSec, not to mention how women and other underrepresented groups in the community have a more difficult time navigating this industry due to institutional barriers.</p>
<p>In our discussion, Christina touches on the wide variety of resources and events that helped her enter information security, why teamwork is just as important as technical work, and why InfoSec's responsibilities will continue to grow in the near future.</p>
<p><strong>Episode Highlights</strong></p>
<ul>
<li>How Christina's aptitude for IT led her down the path to InfoSec</li>
<li>The "elective" course Christina took that turned out to be career-changing</li>
<li>Why cooperation and group work are so important in InfoSec</li>
<li>The "soft skills" needed to work in security</li>
<li>Infosec was not her 1st or 2nd career!</li>
<li>An overview of Christina's day at Truvantis and how she works with clients</li>
<li>Christina's experience at a SANS women's academy and the Day of Shecurity conference</li>
<li>Why the InfoSec industry needs contributions from people from all backgrounds and how it benefits from diversity in general</li>
<li>The increasing accessibility of conferences and other tech events for those who can't attend</li>
<li>InfoSec's important role as companies have more and more access to users' data</li>
</ul><br/>
<p><strong>Quotes</strong></p>
<ul>
<li>"I found that just the general atmosphere of security and the overall focus of what you're trying to accomplish was really helpful."</li>
<li>"Anything you're gonna do in security, you're gonna do as a team."</li>
<li>"Being open to learning new things is really important with this particular field."</li>
<li>"Even if I don't understand everything they're talking about, it gives me at least a start and a basic understanding that I can then research later."</li>
<li>"Being a professional in this field, it's so important that we are able to make other people safe."</li>
</ul><br/>
<p><strong>Links</strong>:</p>
<ul>
<li>Christina's LinkedIn: <a href="https://www.linkedin.com/in/christinahanson461/">https://www.linkedin.com/in/christinahanson461/</a></li>
<li>Day of Shecurity: <a href="https://www.dayofshecurity.com/">https://www.dayofshecurity.com/</a></li>
<li>SANS Women's Academy: <a href="https://www.sans.org/cyb">https://www.sans.org/cyb</a></li>
<li>Merritt College: <a href="http://www.merritt.edu/">http://www.merritt.edu/</a></li>
<li>Dr. Johannes Ullrich: <a href="https://twitter.com/johullrich">https://twitter.com/johullrich</a></li>
<li>SANS Daily Podcast: <a href="https://isc.sans.edu/podcast.html">https://isc.sans.edu/podcast.html</a></li>
<li>The Cyberwire Podcasts: <a href="https://isc.sans.edu/podcast.html">https://isc.sans.edu/podcast.html</a></li>
<li>OWASP: <a href="https://www.owasp.org">https://www.owasp.org</a></li>
<li>Amanda Rousseau (@malwareunicorn): <a href="https://twitter.com/malwareunicorn">https://twitter.com/malwareunicorn</a></li>
<li>Dead Drop SF: <a href="https://www.meetup.com/Dead-Drop-SF/">https://www.meetup.com/Dead-Drop-SF/</a></li>
</ul><br/><p>See <a href="https://omnystudio.com/listener">omnystudio.com/listener</a> for privacy information.</p><p>Mentioned in this episode:</p><p><a href="https://getting-into-infosec.captivate.fm/stayintouch">Stay In Touch</a></p>]]></content:encoded><link><![CDATA[https://getting-into-infosec.captivate.fm/episode/christina-hanson-from-hoa-manager-to-headfirst-into-infosec]]></link><guid isPermaLink="false">706b9377-6977-4cc1-b8f1-6a990259b183</guid><itunes:image href="https://artwork.captivate.fm/a282fb89-f354-4703-bfe4-68459872595a/image.jpg"/><dc:creator><![CDATA[Ayman Elsawah (@coffeewithayman)]]></dc:creator><pubDate>Mon, 22 Oct 2018 07:15:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/e42c311c-d2c9-4187-8c79-86b8902eb6cd/audio.mp3" length="41425107" type="audio/mpeg"/><itunes:duration>43:09</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>3</itunes:episode><podcast:episode>3</podcast:episode><itunes:summary>Christina Hanson is a security analyst working for Truvantis Cyber Security Consulting and one of my former boot camp students! She has extensive technical experience and a deep understanding of the collaborative nature of Information Security, not to mention how women and other underrepresented groups in the community have a more difficult time navigating this industry due to institutional barriers.

In our discussion, Christina touches on the wide variety of resources and events that helped her enter information security, why teamwork is just as important as technical work, and why InfoSec&apos;s responsibilities will continue to grow in the near future.</itunes:summary><itunes:author>Ayman Elsawah (@coffeewithayman)</itunes:author></item><item><title>0day - From &quot;Geek Squad&quot; tech to DevSecOps</title><itunes:title>0day - From &quot;Geek Squad&quot; tech to DevSecOps</itunes:title><description><![CDATA[<p>0day (&ldquo;Zero Day&rdquo;) is a security researcher who specializes in distributed systems security.</p>
<p>Throughout his career journey through a "Geek Squad"-like service at Circuit City ("Firedog") to trading floors and corporate information security, he&rsquo;s amassed significant experience in the industry. He is an example of how security consciousness is important even before you're an official security "pro."</p>
<p>In our conversation, 0day discusses getting into computers as an inner-city kid, acknowledging how our hangups can affect the growth of InfoSec, the benefits of older technology, and much more.</p>
<p><strong>Episode Highlights</strong></p>
<ul>
<li>
<p>0day defines distributed systems and how he and his team ensure they remain secure</p>
</li>
<li>
<p>How his first hacking experience arose out of necessity</p>
</li>
<li>
<p>The inner-city program that fostered 0day&rsquo;s early interest in computer systems</p>
</li>
<li>
<p>How the Modem Age's less-advanced technology gave him a clearer understanding of how computers and the Internet worked</p>
</li>
<li>
<p>How Circuit City allowed o take his first step into the professional tech world</p>
</li>
<li>
<p>His first taste of information security dealing with his company&rsquo;s most dissatisfied clients</p>
</li>
<li>
<p>Tracking down a security vulnerability through a coworker&rsquo;s NSFW browsing habits</p>
</li>
<li>
<p>Thoughts on the modern security industry and how it could be improved</p>
</li>
<li>
<p>The importance of getting over prejudices and mentoring those coming into InfoSec</p>
</li>
<li>
<p>Book and conference recommendations for those starting out or interested in the industry.</p>
</li>
<li>
<p>Average routine at his current job</p>
</li>
<li>
<p>Why computer science alone isn&rsquo;t a solid enough background to get into InfoSec</p>
</li>
<li>
<p>Advice for overcoming shyness at your first security conference</p>
</li>
</ul><br/>
<p><strong>Quotes</strong></p>
<ul>
<li>
<p>&ldquo;The malware I came across in those days, I still don&rsquo;t see anything as unique.&rdquo;</p>
</li>
<li>
<p>&ldquo;We should really reach out to a wider swath of society to give them an interest in information security.&rdquo;</p>
</li>
<li>
<p>&ldquo;We, as a community, need to be less exclusionary by default and be willing to look at some of these candidates who we are ignoring just for the sake of our feelings toward a particular certification or particular path.&rdquo;</p>
</li>
<li>
<p>&ldquo;We, as people who are more seasoned in the industry, now have the responsibility to also make ourselves available to those who are coming into the industry.&rdquo;</p>
</li>
<li>
<p>&ldquo;When you take away some of the complexity, it makes it more difficult for someone to understand the underlying constructs, but at the same time, it makes it easier for them to access so there has to be a balance.&rdquo;</p>
</li>
<li>
<p>&ldquo;As you start to get really familiar with anything, you can see both the dark side and the light side of it.&rdquo;</p>
</li>
<li>
<p>&ldquo;We, as professionals, have some responsibility to disseminate correct, accurate knowledge.&rdquo;</p>
</li>
</ul><br/>
<p><strong>Links</strong></p>
<ul>
<li>
<p>0day&rsquo;s Twitter account: <a href="https://twitter.com/0daysimpson">https://twitter.com/0daysimpson</a></p>
</li>
<li>
<p>Youtube talk about Twitter: <a href="https://www.youtube.com/watch?v=vRYOQeJng50">https://www.youtube.com/watch?v=vRYOQeJng50</a></p>
</li>
<li>
<p>Outro: "Cyber Sunset"</p>
</li>
</ul><br/>
<p><strong>Getting Into Infosec:</strong></p>
<ul>
<li>
<p>Twitter: <a href="https://twitter.com/coffeewithayman">https://twitter.com/coffeewithayman</a></p>
</li>
<li>
<p>YouTube: <a href="https://www.youtube.com/channel/UCg6gV_gdfc188HZdN8LUx4A">https://www.youtube.com/channel/UCg6gV_gdfc188HZdN8LUx4A</a></p>
</li>
<li>
<p>Book: <a...]]></description><content:encoded><![CDATA[<p>0day (&ldquo;Zero Day&rdquo;) is a security researcher who specializes in distributed systems security.</p>
<p>Throughout his career journey through a "Geek Squad"-like service at Circuit City ("Firedog") to trading floors and corporate information security, he&rsquo;s amassed significant experience in the industry. He is an example of how security consciousness is important even before you're an official security "pro."</p>
<p>In our conversation, 0day discusses getting into computers as an inner-city kid, acknowledging how our hangups can affect the growth of InfoSec, the benefits of older technology, and much more.</p>
<p><strong>Episode Highlights</strong></p>
<ul>
<li>
<p>0day defines distributed systems and how he and his team ensure they remain secure</p>
</li>
<li>
<p>How his first hacking experience arose out of necessity</p>
</li>
<li>
<p>The inner-city program that fostered 0day&rsquo;s early interest in computer systems</p>
</li>
<li>
<p>How the Modem Age's less-advanced technology gave him a clearer understanding of how computers and the Internet worked</p>
</li>
<li>
<p>How Circuit City allowed o take his first step into the professional tech world</p>
</li>
<li>
<p>His first taste of information security dealing with his company&rsquo;s most dissatisfied clients</p>
</li>
<li>
<p>Tracking down a security vulnerability through a coworker&rsquo;s NSFW browsing habits</p>
</li>
<li>
<p>Thoughts on the modern security industry and how it could be improved</p>
</li>
<li>
<p>The importance of getting over prejudices and mentoring those coming into InfoSec</p>
</li>
<li>
<p>Book and conference recommendations for those starting out or interested in the industry.</p>
</li>
<li>
<p>Average routine at his current job</p>
</li>
<li>
<p>Why computer science alone isn&rsquo;t a solid enough background to get into InfoSec</p>
</li>
<li>
<p>Advice for overcoming shyness at your first security conference</p>
</li>
</ul><br/>
<p><strong>Quotes</strong></p>
<ul>
<li>
<p>&ldquo;The malware I came across in those days, I still don&rsquo;t see anything as unique.&rdquo;</p>
</li>
<li>
<p>&ldquo;We should really reach out to a wider swath of society to give them an interest in information security.&rdquo;</p>
</li>
<li>
<p>&ldquo;We, as a community, need to be less exclusionary by default and be willing to look at some of these candidates who we are ignoring just for the sake of our feelings toward a particular certification or particular path.&rdquo;</p>
</li>
<li>
<p>&ldquo;We, as people who are more seasoned in the industry, now have the responsibility to also make ourselves available to those who are coming into the industry.&rdquo;</p>
</li>
<li>
<p>&ldquo;When you take away some of the complexity, it makes it more difficult for someone to understand the underlying constructs, but at the same time, it makes it easier for them to access so there has to be a balance.&rdquo;</p>
</li>
<li>
<p>&ldquo;As you start to get really familiar with anything, you can see both the dark side and the light side of it.&rdquo;</p>
</li>
<li>
<p>&ldquo;We, as professionals, have some responsibility to disseminate correct, accurate knowledge.&rdquo;</p>
</li>
</ul><br/>
<p><strong>Links</strong></p>
<ul>
<li>
<p>0day&rsquo;s Twitter account: <a href="https://twitter.com/0daysimpson">https://twitter.com/0daysimpson</a></p>
</li>
<li>
<p>Youtube talk about Twitter: <a href="https://www.youtube.com/watch?v=vRYOQeJng50">https://www.youtube.com/watch?v=vRYOQeJng50</a></p>
</li>
<li>
<p>Outro: "Cyber Sunset"</p>
</li>
</ul><br/>
<p><strong>Getting Into Infosec:</strong></p>
<ul>
<li>
<p>Twitter: <a href="https://twitter.com/coffeewithayman">https://twitter.com/coffeewithayman</a></p>
</li>
<li>
<p>YouTube: <a href="https://www.youtube.com/channel/UCg6gV_gdfc188HZdN8LUx4A">https://www.youtube.com/channel/UCg6gV_gdfc188HZdN8LUx4A</a></p>
</li>
<li>
<p>Book: <a href="https://www.amazon.com/Breaking-Step-Step-Starting-Information-ebook/dp/B07N15GTPC/">https://www.amazon.com/Breaking-Step-Step-Starting-Information-ebook/dp/B07N15GTPC/</a></p>
</li>
</ul><br/><p>See <a href="https://omnystudio.com/listener">omnystudio.com/listener</a> for privacy information.</p><p>Mentioned in this episode:</p><p><a href="https://getting-into-infosec.captivate.fm/stayintouch">Stay In Touch</a></p>]]></content:encoded><link><![CDATA[https://getting-into-infosec.captivate.fm/episode/0day-from-geek-squad-tech-to-devsecops]]></link><guid isPermaLink="false">67f20037-45b7-452b-b07e-bf6c890599e5</guid><itunes:image href="https://artwork.captivate.fm/37e8a3c8-d76a-4e23-a11d-17c7fe39d9e2/image.jpg"/><dc:creator><![CDATA[Ayman Elsawah (@coffeewithayman)]]></dc:creator><pubDate>Mon, 15 Oct 2018 07:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/373c0b66-2fb1-42aa-98ea-c636daeadd9f/audio.mp3" length="40375590" type="audio/mpeg"/><itunes:duration>42:03</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>2</itunes:episode><podcast:episode>2</podcast:episode><itunes:summary>0day (“Zero Day”) is a security researcher who specializes in distributed systems security. 

In his career journey through Circuit City&apos;s Firedog service, trading floors and corporate information security, he’s amassed significant experience in the industry and is an example of how security consciousness is important even before you&apos;re an official security &quot;pro&quot;.

In our conversation, 0day discusses getting into computers as an inner city kid, acknowledging how our hangups can affect the growth of InfoSec, the benefits of older technology, and much more.</itunes:summary><itunes:author>Ayman Elsawah (@coffeewithayman)</itunes:author></item><item><title>Dan Borges - From Infosec ITAdmin to Red Teamer to CTF Organizer</title><itunes:title>Dan Borges - From Infosec ITAdmin to Red Teamer to CTF Organizer</itunes:title><description><![CDATA[<p>Permalink and Transcript: http://gettingintoinfosec.com/dan</p>
<p>In this first episode, I chat with Dan Borges, a professional red teamer, blogger, and security tool developer.</p>
<p>Dan Borges discusses his early experiences using and exploiting computer systems, how InfoSec experts work with companies, and the new tools he and others created and released this year!</p>
<p><strong>Episode Highlights:</strong></p>
<ul>
<li>
<p>Dan explains how he became involved in information security,<br>including his introduction to programming through a Lego robotics<br>program.</p>
</li>
<li>
<p>His early experiences as a pen-tester&mdash;i.e. a penetration tester, who<br>looks for system security weaknesses&mdash;and why it&rsquo;s difficult to get<br>hands-on experience in that field.</p>
</li>
<li>
<p>The benefits of becoming an Offensive Security Certified Professional<br>(OSCP).</p>
</li>
<li>
<p>What does a red team do in an organization, and how is it different<br>from pen-testing?</p>
</li>
<li>
<p>Dan describes the day-to-day life of a pen-tester and the kind of<br>conflicts they can run into.</p>
</li>
<li>
<p>A few war stories from the trenches of InfoSec, as well as some of<br>the tools pen-testers use.</p>
</li>
<li>
<p>How being grounded led to Dan&rsquo;s earliest hacking experiences, and the<br>ways his parents fostered his interests and mentality.</p>
</li>
<li>
<p>What conferences should InfoSec beginners check out?</p>
</li>
<li>
<p>Fun and beneficial ways you can &ldquo;hack&rdquo; reading.</p>
</li>
<li>
<p>Dan&rsquo;s tips for those starting off or looking to transition into<br>Infosec.</p>
</li>
<li>
<p>An in-depth look at one of the newer tools Dan uses for his work.</p>
</li>
<li>
<p>The rules and intricacies of InfoSec competitions.</p>
</li>
</ul><br/>
<p><strong>Quotes:</strong></p>
<ul>
<li>
<p>&ldquo;It&rsquo;s such a catch-22 to get practical, hands-on experience to go to these jobs because, y&rsquo;know, hacking&rsquo;s illegal, right?&rdquo;</p>
</li>
<li>
<p>&ldquo;We don&rsquo;t just go in and blow the brakes off people, we&rsquo;re trying to measurably improve security.&rdquo;</p>
</li>
<li>
<p>&ldquo;It was a constant escalation war, cat-and-mouse like that. They&rsquo;d take something away and I&rsquo;d figure out how to use the computer with that limitation.&rdquo;</p>
</li>
</ul><br/>
<p><strong>Links:</strong></p>
<ul>
<li>
<p>Dan Borges&rsquo; personal blog: http://lockboxx.blogspot.com/</p>
</li>
<li>
<p>Dan&rsquo;s LinkedIn: https://www.linkedin.com/in/borges1337/</p>
</li>
<li>
<p>Dan on Twitter: https://twitter.com/1njection</p>
</li>
<li>
<p>Dan and Alex's DEFCON Talk on Gscript: https://www.youtube.com/watch?v=8yjMlMf8NpQ</p>
</li>
<li>
<p>Gscript: Genesis Scripting Engine: https://github.com/gen0cide/gscript</p>
</li>
<li>
<p>NationalCPTC (Collegiate Penetration Testing Competition): https://nationalcptc.org/</p>
</li>
<li>
<p>Outro Music: Missing You by Trash80: https://trash80.bandcamp.com/track/missing-you</p>
</li>
</ul><br/>
<p><strong>Getting Into Infosec:</strong></p>
<ul>
<li>
<p>Twitter: https://twitter.com/coffeewithayman</p>
</li>
<li>
<p>YouTube: https://www.youtube.com/channel/UCg6gV_gdfc188HZdN8LUx4A</p>
</li>
<li>
<p>Book: https://www.amazon.com/Breaking-Step-Step-Starting-Information-ebook/dp/B07N15GTPC/</p>
</li>
</ul><br/><p>See <a href="https://omnystudio.com/listener">omnystudio.com/listener</a> for privacy information.</p><p>Mentioned in this episode:</p><p><a href="https://getting-into-infosec.captivate.fm/stayintouch">Stay In Touch</a></p>]]></description><content:encoded><![CDATA[<p>Permalink and Transcript: http://gettingintoinfosec.com/dan</p>
<p>In this first episode, I chat with Dan Borges, a professional red teamer, blogger, and security tool developer.</p>
<p>Dan Borges discusses his early experiences using and exploiting computer systems, how InfoSec experts work with companies, and the new tools he and others created and released this year!</p>
<p><strong>Episode Highlights:</strong></p>
<ul>
<li>
<p>Dan explains how he became involved in information security,<br>including his introduction to programming through a Lego robotics<br>program.</p>
</li>
<li>
<p>His early experiences as a pen-tester&mdash;i.e. a penetration tester, who<br>looks for system security weaknesses&mdash;and why it&rsquo;s difficult to get<br>hands-on experience in that field.</p>
</li>
<li>
<p>The benefits of becoming an Offensive Security Certified Professional<br>(OSCP).</p>
</li>
<li>
<p>What does a red team do in an organization, and how is it different<br>from pen-testing?</p>
</li>
<li>
<p>Dan describes the day-to-day life of a pen-tester and the kind of<br>conflicts they can run into.</p>
</li>
<li>
<p>A few war stories from the trenches of InfoSec, as well as some of<br>the tools pen-testers use.</p>
</li>
<li>
<p>How being grounded led to Dan&rsquo;s earliest hacking experiences, and the<br>ways his parents fostered his interests and mentality.</p>
</li>
<li>
<p>What conferences should InfoSec beginners check out?</p>
</li>
<li>
<p>Fun and beneficial ways you can &ldquo;hack&rdquo; reading.</p>
</li>
<li>
<p>Dan&rsquo;s tips for those starting off or looking to transition into<br>Infosec.</p>
</li>
<li>
<p>An in-depth look at one of the newer tools Dan uses for his work.</p>
</li>
<li>
<p>The rules and intricacies of InfoSec competitions.</p>
</li>
</ul><br/>
<p><strong>Quotes:</strong></p>
<ul>
<li>
<p>&ldquo;It&rsquo;s such a catch-22 to get practical, hands-on experience to go to these jobs because, y&rsquo;know, hacking&rsquo;s illegal, right?&rdquo;</p>
</li>
<li>
<p>&ldquo;We don&rsquo;t just go in and blow the brakes off people, we&rsquo;re trying to measurably improve security.&rdquo;</p>
</li>
<li>
<p>&ldquo;It was a constant escalation war, cat-and-mouse like that. They&rsquo;d take something away and I&rsquo;d figure out how to use the computer with that limitation.&rdquo;</p>
</li>
</ul><br/>
<p><strong>Links:</strong></p>
<ul>
<li>
<p>Dan Borges&rsquo; personal blog: http://lockboxx.blogspot.com/</p>
</li>
<li>
<p>Dan&rsquo;s LinkedIn: https://www.linkedin.com/in/borges1337/</p>
</li>
<li>
<p>Dan on Twitter: https://twitter.com/1njection</p>
</li>
<li>
<p>Dan and Alex's DEFCON Talk on Gscript: https://www.youtube.com/watch?v=8yjMlMf8NpQ</p>
</li>
<li>
<p>Gscript: Genesis Scripting Engine: https://github.com/gen0cide/gscript</p>
</li>
<li>
<p>NationalCPTC (Collegiate Penetration Testing Competition): https://nationalcptc.org/</p>
</li>
<li>
<p>Outro Music: Missing You by Trash80: https://trash80.bandcamp.com/track/missing-you</p>
</li>
</ul><br/>
<p><strong>Getting Into Infosec:</strong></p>
<ul>
<li>
<p>Twitter: https://twitter.com/coffeewithayman</p>
</li>
<li>
<p>YouTube: https://www.youtube.com/channel/UCg6gV_gdfc188HZdN8LUx4A</p>
</li>
<li>
<p>Book: https://www.amazon.com/Breaking-Step-Step-Starting-Information-ebook/dp/B07N15GTPC/</p>
</li>
</ul><br/><p>See <a href="https://omnystudio.com/listener">omnystudio.com/listener</a> for privacy information.</p><p>Mentioned in this episode:</p><p><a href="https://getting-into-infosec.captivate.fm/stayintouch">Stay In Touch</a></p>]]></content:encoded><link><![CDATA[https://getting-into-infosec.captivate.fm/episode/dan-borges-from-infosec-itadmin-to-red-teamer-to-ctf-organizer]]></link><guid isPermaLink="false">6b85848a-024a-447c-a708-eb7528a03b95</guid><itunes:image href="https://artwork.captivate.fm/fe58a8e8-7c6f-4a5b-9927-4d27892a982d/image.jpg"/><dc:creator><![CDATA[Ayman Elsawah (@coffeewithayman)]]></dc:creator><pubDate>Mon, 08 Oct 2018 08:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/63c16156-77d7-4782-8b1c-5ae18cad388e/audio.mp3" length="56759612" type="audio/mpeg"/><itunes:duration>59:07</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>1</itunes:episode><podcast:episode>1</podcast:episode><itunes:summary>In this first episode, I chat with Dan Borges, a professional red teamer, blogger, and security tool developer. 

Dan discusses his early experiences using and exploiting computer systems, how InfoSec experts work with companies, and a new tools he and other created and released this year!</itunes:summary><itunes:author>Ayman Elsawah (@coffeewithayman)</itunes:author></item><item><title>Trailer</title><itunes:title>Trailer</itunes:title><description><![CDATA[<p>Hi there! I am Ayman Elsawah, the host of a new podcast focused on helping you learn more about the information security field and how to be successful in it. We will walk through the shoes of seasoned information security experts as well as those new to the field, learn from their experiences, and find out how they got started. Join me on this wonderful journey!</p>
<p>Music: &quot;Modem&quot; by <a href="https://twitter.com/skilldrick">@Skilldrick</a></p><p>See <a href="https://omnystudio.com/listener">omnystudio.com/listener</a> for privacy information.</p><p>Mentioned in this episode:</p><p><a href="https://getting-into-infosec.captivate.fm/stayintouch">Stay In Touch</a></p>]]></description><content:encoded><![CDATA[<p>Hi there! I am Ayman Elsawah, the host of a new podcast focused on helping you learn more about the information security field and how to be successful in it. We will walk through the shoes of seasoned information security experts as well as those new to the field, learn from their experiences, and find out how they got started. Join me on this wonderful journey!</p>
<p>Music: &quot;Modem&quot; by <a href="https://twitter.com/skilldrick">@Skilldrick</a></p><p>See <a href="https://omnystudio.com/listener">omnystudio.com/listener</a> for privacy information.</p><p>Mentioned in this episode:</p><p><a href="https://getting-into-infosec.captivate.fm/stayintouch">Stay In Touch</a></p>]]></content:encoded><link><![CDATA[https://getting-into-infosec.captivate.fm/episode/trailer]]></link><guid isPermaLink="false">29d594a2-4e70-42ad-9e2e-4c88f6410d2b</guid><itunes:image href="https://artwork.captivate.fm/4b809b4f-1058-44d4-9713-a7db14ea621a/image.jpg"/><dc:creator><![CDATA[Ayman Elsawah (@coffeewithayman)]]></dc:creator><pubDate>Wed, 05 Sep 2018 17:58:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/c7702061-da0a-4d23-9161-62e5c91515df/audio.mp3" length="963256" type="audio/mpeg"/><itunes:duration>01:00</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>trailer</itunes:episodeType><itunes:summary>A trailer for the upcoming podcast Getting Into Information Security</itunes:summary><itunes:author>Ayman Elsawah (@coffeewithayman)</itunes:author></item></channel></rss>