For the new cyber security consultants, either your internal or providing consulting services to clients. Speaking this from GRC point of view, most consultant may ignore the fact that for one being effectively in providing sound advice to clients, especially in this modern era of cyber security, one need to at least understand what need to be protected i.e information asset.
Information can be physical or digital/electronic. Information has its life cycle, and go through phases such as creation, processing, and storage. There is a famous data cycle – refer to this blog as https://www.securosis.com/blog/data-security-lifecycle-2.0 . All the phases information will need to be protected.
Diagram: The data security life cycle.
Through this life cycle, when considering digital form of information, it will touch different layers such as Computing, storage, network, and well all these things they just don’t live in the vacuum (cloud), they need to physically hosted, that’s where physical security comes into play.
I believe in deconstructing things to its core or the basic bare. I think the areas below, a cyber security consultant should at least have some high level understanding on how things work and how they are built. (architecture)
This a place holder, I will expand this post when I get time to write.
I have been a QSA since 2013, and before that I worked for a multi-national bank from 2007 to 2009, which had a programme to secure card payments, hence my early involvement of PCI World.
so what do PCI stands for ? Payment Card Industry, and maybe your next question will be what is PCI DSS and what is the security council SSC ( Payment Card Industry Security Standards Council )? and ofcourse what is PCI QSA? I will answer these questions in an expanded post. For now, a quick reference go to the PCI SSC website here
The say a typical CEO reads about 60 books per year. That is roughly around one book a week. I try to keep up with that pace, but sometimes I fall short. I tend to read one book every 2 weeks, and this covers different categories including self-help, autobio,business, cyber security among many other categories. What I would advise to new entrants to cyber security, to make sure to read different business books to complement your technical knowledge, because if you cannot translate your security knowledge to help the business, then it becomes useless.
So for the this year, I have been reading the following books:
The Effective Executive
Fast Focus – Damon Zahariades
80/20 Your Life – Damon Zahariades
Tools of Titans – Timothy Ferris
5 AM Club – Robin Sharma
The Art of Learning – Josh Waitzkin
Tribe of Mentors – Timothy Ferriss
Power – Jeffrey Pfeffer
The 4-hour Work Week (Audiobook) – Tim Ferriss
The 7 Habits of Highly Effective People – Stephen R. Covey
What Got You Here Won’t Get You There – Marshall Goldsmith
I have been asked this question a few many times, on how can i get started or get into infosec / cyber security? My answer it depends 🙂
It depends what path you want to travel through to your destionation – technical or non-technical.
I will start with technical path, there are couple of field for technical path including penetration tester, appplication security SME, and sec ops, just naming a few.
For example to be a pentester, you will need to have basics in Networking, Operating System (*nix, Windows, Mobile,) Database, Application, etc. This role need to have breath knowledge in order to understand how the technology is made, operate and then one can go deeper intp specific area of testing e.g. application testing or infrastructure testing. So my advice to start or to get into this field, one need to get understand of the technologies mentioned for started.
on the next post, I will speak on the other technical path.