SlideShare a Scribd company logo
1 of 42
Download to read offline
Continuous
For Everyone
Continuous
@c3rkah | https://www.linkedin.com/in/mattscheurer/
https://www.slideshare.net/cerkah/
- Matt Scheurer
About MeAbout Me
I work here:
As a Sr.
Systems Security Engineer
I serve as Chair for the
I am also an
Ambassador & Security Researcher for
ObjectivesObjectives
I work here:
As a Sr.
Systems Security Engineer
●
Provide attendees with ideas and options for
continuing to expand their Information Security
skills
– Not all of these ideas will appeal to everyone
●
Pick and choose the right ones specifically for you
– Examples provided are not exhaustive lists
●
There are considerably more resources than I can cover
●
If there is something missing, please let me us know!
Why (should I do any of this)?Why (should I do any of this)?
I work here:
As a Sr.
Systems Security Engineer
●
Developing and improving your skills helps
whether...
– You are looking for that first career opportunity
– Looking to take that next career step
– Making impacts to safeguard your own job security
– You want to help mentor others
– You are looking for ways to give back / get involved
Inspirations for this TalkInspirations for this Talk
●
Creative workarounds
to learning with
– Very limited time
– Zero training budget
●
Free educational sites
●
Other conference
speakers & talks
●
Articles, Blogs,
Podcasts, & Videos
●
Bugcrowd University
●
Personal Experience
– Running a monthly
local InfoSec meetup
group
– Mentoring others
The Qualification TriangleThe Qualification Triangle
●
Experience is typically the
most valued by employers
●
Triangle doesn’t account for
– Luck
– Security Clearance
– Emotional Intelligence
Quotient (EIQ)
Experience
Education Certification
InfoSec Street Cred?InfoSec Street Cred?
●
Getting that first opportunity in InfoSec is hard!
– Some get lucky with a good co-op or internship
●
Equipped with only a degree(s) and/or
certifications alone, the world will probably not
beat a path to your door in spite of the number
of open positions in InfoSec and skills gaps
– But I do have some ideas!
Standing out from the CrowdStanding out from the Crowd
●
Ideas to demonstrate passion and knowledge
– Writing
– Recording and posting new Tech Videos
– Volunteering
– Bug Bounties
– Teaching Others
Writing ExamplesWriting Examples
●
Tech Articles
●
Tech Blogs
●
White Papers
●
Event Write-Ups, such as:
- Key Takeaways
- Lessons Learned
Video Lesson ExamplesVideo Lesson Examples
●
Record & Post Videos
- YouTube Channel? (Maybe Not Right Now)
- BitChute or other YouTube alternatives
Volunteering ExamplesVolunteering Examples
●
Technology Conferences
●
Information Security / Hacker Conferences
●
Local Tech & InfoSec Meetup Groups
- Most groups want help, even if it’s not publicized
Teaching Others at...Teaching Others at...
●
Conferences
●
Meetup Groups
●
Webinars
●
Workshops
●
Brown Bag Lunches
●
School Labs
●
Library Rooms
●
Hallways
●
Everywhere Else!
Learning & Teaching OpportunitiesLearning & Teaching Opportunities
Bug Bounty ProgramsBug Bounty Programs
●
Get Paid to Hack Stuff!
- Legally and Ethically!!!
- Also gain professional experience
- And / Or -
●
Consider Entering CTF Competitions
- Add personal skills and increase proficiency
Tying it all TogetherTying it all Together
●
Publicly journal the things you learn when you
– Take a class, participate in a CTF, attend a
workshop, earn a certification, complete an online
challenge or course, conduct research, etc.?
– Publish a write-up, or post a video recap, or both
– Present at local meetup groups & conferences
●
Put these activities on your Resume!
LearningLearning
●
There are plenty of ways to learn new things
– And probably more places now than ever before
– But I still learn best through hands-on activities and
time in the seat
●
Let’s look at some free and low cost examples...
SEED labsSEED labs
The SEED project's objective is
to develop hands-on laboratory
exercises (called SEED labs) for
computer and information
security education and help
instructors adopt these labs in
their curricula. At present, there
are over 30 labs available.
Web site:
https://seedsecuritylabs.org/
SEED labs - Software SecuritySEED labs - Software Security
●
Buffer Overflow Vulnerability
Lab
●
Return-to-Libc Attack Lab
●
Environment Variable and
Set-UID Lab
●
Race Condition Vulnerability
Lab
●
Dirty COW Attack Lab
●
Format String Vulnerability
Lab
●
Shellshock Vulnerability Lab
SEED labs - Network SecuritySEED labs - Network Security
●
Packet Sniffing and Spoofing
Lab
●
TCP/IP Attack Lab
●
Heartbleed Attack Lab
●
Local DNS Attack Lab
●
Remote DNS Attack Lab
●
Firewall Exploration Lab
●
Firewall Evasion Lab
●
Virtual Private Network
(VPN) Lab
SEED labs – More Attack LabsSEED labs – More Attack Labs
●
Web Security Labs
– Cross-site Scripting Attack
Lab
– Cross-Site Request
Forgery Attack Lab
– SQL Injection Attack Lab
●
System Security Labs
– Meltdown Attack Lab
– Spectre Attack Lab
SEED labs – Still More LabsSEED labs – Still More Labs
●
Cryptography Labs
– MD5 Collision Attack Lab
– RSA Public-Key Encryption
and Signature Lab
– Secret Key Encryption Lab
– Pseudo Random Number
Generation Lab
– Public-Key Infrastructure
(PKI) Lab
●
Mobile Security Labs
– Android Repackaging
Attack Lab
– Android Device Rooting
Lab
SEED labs CaveatsSEED labs Caveats
The online documentation is
sparse. You will want to order
Dr. Wenliang (Kevin) Du’s
accompanying “Computer &
Internet Security: A Hands-on
Approach” Second Edition book
(~$70) to get the most out of
these open labs.
ENISA Training LabsENISA Training Labs
Created by the European Union
Agency for Cybersecurity
(ENISA), the ENISA CSIRT
training material, containing
Handbooks for teachers,
Toolsets for students and Virtual
Images to support hands on
training sessions.
Web site:
https://bit.ly/296L1Ae
ENISA Labs – Technical (1/2)ENISA Labs – Technical (1/2)
●
Building artifact handling and
analysis environment
●
Processing and storing artifacts
●
Artifact analysis fundamentals
●
Advanced artifact handling
●
Introduction to advanced artifact
analysis
●
Dynamic analysis of artifacts
●
Static analysis of artifacts
●
Forensic analysis: Local
Incident Response
●
Forensic analysis: Network
Incident Response
●
Forensic analysis: Web server
Analysis
●
Developing Countermeasures
●
Common framework for artifact
analysis activities
ENISA Labs – Technical (2/2)ENISA Labs – Technical (2/2)
●
Using indicators to enhance
defence capabilities
●
Identification and handling of
electronic evidence
●
Digital forensics
●
Mobile threats incident handling
●
Mobile threats incident handling
(Part II)
●
Proactive incident detection
●
Automation in incident handling
●
Introduction to network
forensics (New)
●
Honeypots
●
Vulnerability handling
●
Presenting, correlating and
filtering various feeds
ENISA Training Labs CaveatsENISA Training Labs Caveats
These labs are built with a noticeable international focus as created
by the EU. GMT lab times are different from USA time zones.
Documentation is written in International English not US English.
Legal references are not always applicable in the United States.
Bugcrowd UniversityBugcrowd University
Bugcrowd University is a free
and open source project for
security, education, and training
for the whitehat hacker
community. Learn the basics of
hacking and bug bounty hunting
with videos, tutorials, labs, best
practices and more.
Web site:
https://bit.ly/2NAit8r
More Free Hands-On LearningMore Free Hands-On Learning
AppSec Hands-On LearningAppSec Hands-On Learning
Goal SettingGoal Setting
●
If you could do anything you would like in the
next 5 years, what would it be?
●
List out the steps along the way you think a
person would take in order to get there
●
Do those things in your action plan
Jim Cathcart QuotesJim Cathcart Quotes
“Think Like the Person You Intend to Become.”
“If You Will Spend One Extra Hour Each Day
Studying Your Chosen Field, You’ll Be a National
Expert in That Field in Five Years or Less.”
Emotional IntelligenceEmotional Intelligence
Emotional intelligence (EI), emotional leadership (EL), emotional
quotient (EQ) and emotional intelligence quotient (EIQ), is the
capability of individuals to recognize their own emotions and those
of others, discern between different feelings and label them
appropriately, use emotional information to guide thinking and
behavior, and manage and/or adjust emotions to adapt to
environments or achieve one's goal(s).
https://en.wikipedia.org/wiki/Emotional_intelligence
Building up those Soft SkillsBuilding up those Soft Skills
It may sound too touchy-feely for some at first, but I honestly
attribute EIQ for reaching my professional goals. Many studies
conclude that people with the highest EIQ typically achieve more
success and higher compensation than even the smartest people.
There are lots of great articles through the following Google
search:
improving “emotional intelligence”
I recommend bookmarking the one’s most beneficial to you and
revisiting them occasionally as refreshers.
Mom quotes before EIQ was a thingMom quotes before EIQ was a thing
●
“It’s not always what you know,
but sometimes who you know.”
●
“Always treat others as you
would like to be treated.”
●
“If you don’t have anything nice
to say then you shouldn’t say
anything at all.”
●
“Nobody cares how much you
know until they know how much
you care.”
My Advice...My Advice...
Leave the “Trolling” and
flame wars to Orville!
CAUTION!
ConclusionsConclusions
●
Experiment and find what works best for you
ConclusionsConclusions
●
Experiment and find what works best for you
●
Market yourself well (You’re in charge of your
own personal brand)
ConclusionsConclusions
●
Experiment and find what works best for you
●
Market yourself well (You’re in charge of your
own personal brand)
●
Work hard and share these lessons with others
ConclusionsConclusions
●
Experiment and find what works best for you
●
Market yourself well (You’re in charge of your
own personal brand)
●
Work hard and share these lessons with others
●
Never stop learning or challenging yourself
ConclusionsConclusions
●
Experiment and find what works best for you
●
Market yourself well (You’re in charge of your
own personal brand)
●
Work hard and share these lessons with others
●
Never stop learning or challenging yourself
●
Don’t forget those Soft Skills (i.e., EIQ)!
QuestionsQuestions
Who ...
What ...
When ...
Where ...
Why ...
How ...
Continuous
For Everyone
Continuous
@c3rkah | https://www.linkedin.com/in/mattscheurer/
https://www.slideshare.net/cerkah/
Thank you for attending!

More Related Content

Similar to OISF - Continuous Skills Improvement for Everyone

Intro to INFOSEC
Intro to INFOSECIntro to INFOSEC
Intro to INFOSECSean Whalen
 
Software Security Initiative Capabilities: Where Do I Begin?
Software Security Initiative Capabilities: Where Do I Begin? Software Security Initiative Capabilities: Where Do I Begin?
Software Security Initiative Capabilities: Where Do I Begin? Cigital
 
Security Champions - Introduce them in your Organisation
Security Champions - Introduce them in your OrganisationSecurity Champions - Introduce them in your Organisation
Security Champions - Introduce them in your OrganisationIves Laaf
 
DMA - Stupid Cyber Criminal Tricks
DMA - Stupid Cyber Criminal TricksDMA - Stupid Cyber Criminal Tricks
DMA - Stupid Cyber Criminal TricksCiNPA Security SIG
 
Services, tools & practices for a software house
Services, tools & practices for a software houseServices, tools & practices for a software house
Services, tools & practices for a software houseParis Apostolopoulos
 
Testing for the deeplearning folks
Testing for the deeplearning folksTesting for the deeplearning folks
Testing for the deeplearning folksVishwas N
 
How to get started in InfoSec ?
How to get started in InfoSec ?How to get started in InfoSec ?
How to get started in InfoSec ?Chandrapal Badshah
 
Secure Coding - Are we doing it wrong
Secure Coding - Are we doing it wrongSecure Coding - Are we doing it wrong
Secure Coding - Are we doing it wrongbryns
 
UX Beers - A Story about product management at uman.ai - Jasper Verplanken
UX Beers - A Story about product management at uman.ai - Jasper VerplankenUX Beers - A Story about product management at uman.ai - Jasper Verplanken
UX Beers - A Story about product management at uman.ai - Jasper VerplankenUX Antwerp Meetup
 
How To Start Your InfoSec Career
How To Start Your InfoSec CareerHow To Start Your InfoSec Career
How To Start Your InfoSec CareerAndrew McNicol
 
"Threat Model Every Story": Practical Continuous Threat Modeling Work for You...
"Threat Model Every Story": Practical Continuous Threat Modeling Work for You..."Threat Model Every Story": Practical Continuous Threat Modeling Work for You...
"Threat Model Every Story": Practical Continuous Threat Modeling Work for You...Izar Tarandach
 
Splunk September 2023 User Group PDX.pdf
Splunk September 2023 User Group PDX.pdfSplunk September 2023 User Group PDX.pdf
Splunk September 2023 User Group PDX.pdfAmanda Richardson
 
Owasp tds
Owasp tdsOwasp tds
Owasp tdssnyff
 
Push Functional Testing Further
Push Functional Testing FurtherPush Functional Testing Further
Push Functional Testing FurtherAlan Richardson
 
Enhancing Software Engineering Practices at Our Startup.pptx
Enhancing Software Engineering Practices at Our Startup.pptxEnhancing Software Engineering Practices at Our Startup.pptx
Enhancing Software Engineering Practices at Our Startup.pptxmuktar42
 
ASEAN-JAPAN Cyber Security Seminar: How to fill your team gaps with training
ASEAN-JAPAN Cyber Security Seminar: How to fill your team gaps with trainingASEAN-JAPAN Cyber Security Seminar: How to fill your team gaps with training
ASEAN-JAPAN Cyber Security Seminar: How to fill your team gaps with trainingAPNIC
 
Data science unit 1 By: Professor Lili Saghafi
Data science unit 1 By: Professor Lili Saghafi Data science unit 1 By: Professor Lili Saghafi
Data science unit 1 By: Professor Lili Saghafi Professor Lili Saghafi
 

Similar to OISF - Continuous Skills Improvement for Everyone (20)

Year Zero
Year ZeroYear Zero
Year Zero
 
Intro to INFOSEC
Intro to INFOSECIntro to INFOSEC
Intro to INFOSEC
 
Software Security Initiative Capabilities: Where Do I Begin?
Software Security Initiative Capabilities: Where Do I Begin? Software Security Initiative Capabilities: Where Do I Begin?
Software Security Initiative Capabilities: Where Do I Begin?
 
Security Champions - Introduce them in your Organisation
Security Champions - Introduce them in your OrganisationSecurity Champions - Introduce them in your Organisation
Security Champions - Introduce them in your Organisation
 
DMA - Stupid Cyber Criminal Tricks
DMA - Stupid Cyber Criminal TricksDMA - Stupid Cyber Criminal Tricks
DMA - Stupid Cyber Criminal Tricks
 
Services, tools & practices for a software house
Services, tools & practices for a software houseServices, tools & practices for a software house
Services, tools & practices for a software house
 
DevSecOps What Why and How
DevSecOps What Why and HowDevSecOps What Why and How
DevSecOps What Why and How
 
Testing for the deeplearning folks
Testing for the deeplearning folksTesting for the deeplearning folks
Testing for the deeplearning folks
 
How to get started in InfoSec ?
How to get started in InfoSec ?How to get started in InfoSec ?
How to get started in InfoSec ?
 
Secure Coding - Are we doing it wrong
Secure Coding - Are we doing it wrongSecure Coding - Are we doing it wrong
Secure Coding - Are we doing it wrong
 
UX Beers - A Story about product management at uman.ai - Jasper Verplanken
UX Beers - A Story about product management at uman.ai - Jasper VerplankenUX Beers - A Story about product management at uman.ai - Jasper Verplanken
UX Beers - A Story about product management at uman.ai - Jasper Verplanken
 
How To Start Your InfoSec Career
How To Start Your InfoSec CareerHow To Start Your InfoSec Career
How To Start Your InfoSec Career
 
"Threat Model Every Story": Practical Continuous Threat Modeling Work for You...
"Threat Model Every Story": Practical Continuous Threat Modeling Work for You..."Threat Model Every Story": Practical Continuous Threat Modeling Work for You...
"Threat Model Every Story": Practical Continuous Threat Modeling Work for You...
 
Splunk September 2023 User Group PDX.pdf
Splunk September 2023 User Group PDX.pdfSplunk September 2023 User Group PDX.pdf
Splunk September 2023 User Group PDX.pdf
 
Owasp tds
Owasp tdsOwasp tds
Owasp tds
 
Practical Cyber Defense
Practical Cyber DefensePractical Cyber Defense
Practical Cyber Defense
 
Push Functional Testing Further
Push Functional Testing FurtherPush Functional Testing Further
Push Functional Testing Further
 
Enhancing Software Engineering Practices at Our Startup.pptx
Enhancing Software Engineering Practices at Our Startup.pptxEnhancing Software Engineering Practices at Our Startup.pptx
Enhancing Software Engineering Practices at Our Startup.pptx
 
ASEAN-JAPAN Cyber Security Seminar: How to fill your team gaps with training
ASEAN-JAPAN Cyber Security Seminar: How to fill your team gaps with trainingASEAN-JAPAN Cyber Security Seminar: How to fill your team gaps with training
ASEAN-JAPAN Cyber Security Seminar: How to fill your team gaps with training
 
Data science unit 1 By: Professor Lili Saghafi
Data science unit 1 By: Professor Lili Saghafi Data science unit 1 By: Professor Lili Saghafi
Data science unit 1 By: Professor Lili Saghafi
 

More from CiNPA Security SIG

CONHESI 2021 - Exploiting Web APIs
CONHESI 2021 - Exploiting Web APIsCONHESI 2021 - Exploiting Web APIs
CONHESI 2021 - Exploiting Web APIsCiNPA Security SIG
 
BSides Columbus - Lend me your IR's!
BSides Columbus - Lend me your IR's!BSides Columbus - Lend me your IR's!
BSides Columbus - Lend me your IR's!CiNPA Security SIG
 
PwnSchool: Exploiting Web APIs
PwnSchool: Exploiting Web APIsPwnSchool: Exploiting Web APIs
PwnSchool: Exploiting Web APIsCiNPA Security SIG
 
CiNPA Security SIG - Exploiting the Tiredful API
CiNPA Security SIG - Exploiting the Tiredful APICiNPA Security SIG - Exploiting the Tiredful API
CiNPA Security SIG - Exploiting the Tiredful APICiNPA Security SIG
 
Central Ohio InfoSec Summit: Why Script Kiddies Succeed
Central Ohio InfoSec Summit: Why Script Kiddies SucceedCentral Ohio InfoSec Summit: Why Script Kiddies Succeed
Central Ohio InfoSec Summit: Why Script Kiddies SucceedCiNPA Security SIG
 
OISC 2019 - The OWASP Top 10 & AppSec Primer
OISC 2019 - The OWASP Top 10 & AppSec PrimerOISC 2019 - The OWASP Top 10 & AppSec Primer
OISC 2019 - The OWASP Top 10 & AppSec PrimerCiNPA Security SIG
 
Butler Tech - Working in IT and InfoSec
Butler Tech - Working in IT and InfoSecButler Tech - Working in IT and InfoSec
Butler Tech - Working in IT and InfoSecCiNPA Security SIG
 
NKU Cybersecurity Symposium: Active Defense - Helping threat actors hack them...
NKU Cybersecurity Symposium: Active Defense - Helping threat actors hack them...NKU Cybersecurity Symposium: Active Defense - Helping threat actors hack them...
NKU Cybersecurity Symposium: Active Defense - Helping threat actors hack them...CiNPA Security SIG
 
CiNPA Security SIG - Physical Security
CiNPA Security SIG - Physical SecurityCiNPA Security SIG - Physical Security
CiNPA Security SIG - Physical SecurityCiNPA Security SIG
 
CiNPA / CiNPA Security SIG History
CiNPA / CiNPA Security SIG HistoryCiNPA / CiNPA Security SIG History
CiNPA / CiNPA Security SIG HistoryCiNPA Security SIG
 
OISF Aniversary: Active Defense - Helping threat actors hack themselves!
OISF Aniversary: Active Defense - Helping threat actors hack themselves!OISF Aniversary: Active Defense - Helping threat actors hack themselves!
OISF Aniversary: Active Defense - Helping threat actors hack themselves!CiNPA Security SIG
 
BSides Cleveland: Phishing Forensics - Is it just suspicious or is it malicious?
BSides Cleveland: Phishing Forensics - Is it just suspicious or is it malicious?BSides Cleveland: Phishing Forensics - Is it just suspicious or is it malicious?
BSides Cleveland: Phishing Forensics - Is it just suspicious or is it malicious?CiNPA Security SIG
 
BSides Cleveland: Active Defense - Helping threat actors hack themselves!
BSides Cleveland: Active Defense - Helping threat actors hack themselves!BSides Cleveland: Active Defense - Helping threat actors hack themselves!
BSides Cleveland: Active Defense - Helping threat actors hack themselves!CiNPA Security SIG
 
Circle City Con: Phishing Forensics - Is it just suspicious or is it malicious?
Circle City Con: Phishing Forensics - Is it just suspicious or is it malicious?Circle City Con: Phishing Forensics - Is it just suspicious or is it malicious?
Circle City Con: Phishing Forensics - Is it just suspicious or is it malicious?CiNPA Security SIG
 
ISSA COISS: : Phishing Forensics - Is it just suspicious or is it malicious?
ISSA COISS: : Phishing Forensics - Is it just suspicious or is it malicious?ISSA COISS: : Phishing Forensics - Is it just suspicious or is it malicious?
ISSA COISS: : Phishing Forensics - Is it just suspicious or is it malicious?CiNPA Security SIG
 
BSides Cincy: Active Defense - Helping threat actors hack themselves!
BSides Cincy: Active Defense - Helping threat actors hack themselves!BSides Cincy: Active Defense - Helping threat actors hack themselves!
BSides Cincy: Active Defense - Helping threat actors hack themselves!CiNPA Security SIG
 

More from CiNPA Security SIG (20)

CONHESI 2021 - Exploiting Web APIs
CONHESI 2021 - Exploiting Web APIsCONHESI 2021 - Exploiting Web APIs
CONHESI 2021 - Exploiting Web APIs
 
SecureWV: Exploiting Web APIs
SecureWV: Exploiting Web APIsSecureWV: Exploiting Web APIs
SecureWV: Exploiting Web APIs
 
BSides Columbus - Lend me your IR's!
BSides Columbus - Lend me your IR's!BSides Columbus - Lend me your IR's!
BSides Columbus - Lend me your IR's!
 
PwnSchool: Exploiting Web APIs
PwnSchool: Exploiting Web APIsPwnSchool: Exploiting Web APIs
PwnSchool: Exploiting Web APIs
 
CiNPA Security SIG - Exploiting the Tiredful API
CiNPA Security SIG - Exploiting the Tiredful APICiNPA Security SIG - Exploiting the Tiredful API
CiNPA Security SIG - Exploiting the Tiredful API
 
CCC - Lend me your IR's
CCC - Lend me your IR'sCCC - Lend me your IR's
CCC - Lend me your IR's
 
ISC2: AppSec & OWASP Primer
ISC2: AppSec & OWASP PrimerISC2: AppSec & OWASP Primer
ISC2: AppSec & OWASP Primer
 
Central Ohio InfoSec Summit: Why Script Kiddies Succeed
Central Ohio InfoSec Summit: Why Script Kiddies SucceedCentral Ohio InfoSec Summit: Why Script Kiddies Succeed
Central Ohio InfoSec Summit: Why Script Kiddies Succeed
 
AppSec & OWASP Top 10 Primer
AppSec & OWASP Top 10 PrimerAppSec & OWASP Top 10 Primer
AppSec & OWASP Top 10 Primer
 
OISC 2019 - The OWASP Top 10 & AppSec Primer
OISC 2019 - The OWASP Top 10 & AppSec PrimerOISC 2019 - The OWASP Top 10 & AppSec Primer
OISC 2019 - The OWASP Top 10 & AppSec Primer
 
Butler Tech - Working in IT and InfoSec
Butler Tech - Working in IT and InfoSecButler Tech - Working in IT and InfoSec
Butler Tech - Working in IT and InfoSec
 
NKU Cybersecurity Symposium: Active Defense - Helping threat actors hack them...
NKU Cybersecurity Symposium: Active Defense - Helping threat actors hack them...NKU Cybersecurity Symposium: Active Defense - Helping threat actors hack them...
NKU Cybersecurity Symposium: Active Defense - Helping threat actors hack them...
 
CiNPA Security SIG - Physical Security
CiNPA Security SIG - Physical SecurityCiNPA Security SIG - Physical Security
CiNPA Security SIG - Physical Security
 
CiNPA / CiNPA Security SIG History
CiNPA / CiNPA Security SIG HistoryCiNPA / CiNPA Security SIG History
CiNPA / CiNPA Security SIG History
 
OISF Aniversary: Active Defense - Helping threat actors hack themselves!
OISF Aniversary: Active Defense - Helping threat actors hack themselves!OISF Aniversary: Active Defense - Helping threat actors hack themselves!
OISF Aniversary: Active Defense - Helping threat actors hack themselves!
 
BSides Cleveland: Phishing Forensics - Is it just suspicious or is it malicious?
BSides Cleveland: Phishing Forensics - Is it just suspicious or is it malicious?BSides Cleveland: Phishing Forensics - Is it just suspicious or is it malicious?
BSides Cleveland: Phishing Forensics - Is it just suspicious or is it malicious?
 
BSides Cleveland: Active Defense - Helping threat actors hack themselves!
BSides Cleveland: Active Defense - Helping threat actors hack themselves!BSides Cleveland: Active Defense - Helping threat actors hack themselves!
BSides Cleveland: Active Defense - Helping threat actors hack themselves!
 
Circle City Con: Phishing Forensics - Is it just suspicious or is it malicious?
Circle City Con: Phishing Forensics - Is it just suspicious or is it malicious?Circle City Con: Phishing Forensics - Is it just suspicious or is it malicious?
Circle City Con: Phishing Forensics - Is it just suspicious or is it malicious?
 
ISSA COISS: : Phishing Forensics - Is it just suspicious or is it malicious?
ISSA COISS: : Phishing Forensics - Is it just suspicious or is it malicious?ISSA COISS: : Phishing Forensics - Is it just suspicious or is it malicious?
ISSA COISS: : Phishing Forensics - Is it just suspicious or is it malicious?
 
BSides Cincy: Active Defense - Helping threat actors hack themselves!
BSides Cincy: Active Defense - Helping threat actors hack themselves!BSides Cincy: Active Defense - Helping threat actors hack themselves!
BSides Cincy: Active Defense - Helping threat actors hack themselves!
 

Recently uploaded

8377087607 Full Enjoy @24/7-CLEAN-Call Girls In Chhatarpur,
8377087607 Full Enjoy @24/7-CLEAN-Call Girls In Chhatarpur,8377087607 Full Enjoy @24/7-CLEAN-Call Girls In Chhatarpur,
8377087607 Full Enjoy @24/7-CLEAN-Call Girls In Chhatarpur,dollysharma2066
 
Breath, Brain & Beyond_A Holistic Approach to Peak Performance.pdf
Breath, Brain & Beyond_A Holistic Approach to Peak Performance.pdfBreath, Brain & Beyond_A Holistic Approach to Peak Performance.pdf
Breath, Brain & Beyond_A Holistic Approach to Peak Performance.pdfJess Walker
 
Reinventing Corporate Philanthropy_ Strategies for Meaningful Impact by Leko ...
Reinventing Corporate Philanthropy_ Strategies for Meaningful Impact by Leko ...Reinventing Corporate Philanthropy_ Strategies for Meaningful Impact by Leko ...
Reinventing Corporate Philanthropy_ Strategies for Meaningful Impact by Leko ...Leko Durda
 
Lucknow 💋 High Class Call Girls Lucknow 10k @ I'm VIP Independent Escorts Gir...
Lucknow 💋 High Class Call Girls Lucknow 10k @ I'm VIP Independent Escorts Gir...Lucknow 💋 High Class Call Girls Lucknow 10k @ I'm VIP Independent Escorts Gir...
Lucknow 💋 High Class Call Girls Lucknow 10k @ I'm VIP Independent Escorts Gir...anilsa9823
 
《塔夫斯大学毕业证成绩单购买》做Tufts文凭毕业证成绩单/伪造美国假文凭假毕业证书图片Q微信741003700《塔夫斯大学毕业证购买》《Tufts毕业文...
《塔夫斯大学毕业证成绩单购买》做Tufts文凭毕业证成绩单/伪造美国假文凭假毕业证书图片Q微信741003700《塔夫斯大学毕业证购买》《Tufts毕业文...《塔夫斯大学毕业证成绩单购买》做Tufts文凭毕业证成绩单/伪造美国假文凭假毕业证书图片Q微信741003700《塔夫斯大学毕业证购买》《Tufts毕业文...
《塔夫斯大学毕业证成绩单购买》做Tufts文凭毕业证成绩单/伪造美国假文凭假毕业证书图片Q微信741003700《塔夫斯大学毕业证购买》《Tufts毕业文...ur8mqw8e
 
call girls in candolim beach 9870370636] NORTH GOA ..
call girls in candolim beach 9870370636] NORTH GOA ..call girls in candolim beach 9870370636] NORTH GOA ..
call girls in candolim beach 9870370636] NORTH GOA ..nishakur201
 
Call Girls Anjuna beach Mariott Resort ₰8588052666
Call Girls Anjuna beach Mariott Resort ₰8588052666Call Girls Anjuna beach Mariott Resort ₰8588052666
Call Girls Anjuna beach Mariott Resort ₰8588052666nishakur201
 
Lilac Illustrated Social Psychology Presentation.pptx
Lilac Illustrated Social Psychology Presentation.pptxLilac Illustrated Social Psychology Presentation.pptx
Lilac Illustrated Social Psychology Presentation.pptxABMWeaklings
 
REFLECTIONS Newsletter Jan-Jul 2024.pdf.pdf
REFLECTIONS Newsletter Jan-Jul 2024.pdf.pdfREFLECTIONS Newsletter Jan-Jul 2024.pdf.pdf
REFLECTIONS Newsletter Jan-Jul 2024.pdf.pdfssusere8ea60
 
CALL ON ➥8923113531 🔝Call Girls Adil Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Adil Nagar Lucknow best Female serviceCALL ON ➥8923113531 🔝Call Girls Adil Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Adil Nagar Lucknow best Female serviceanilsa9823
 
CALL ON ➥8923113531 🔝Call Girls Mahanagar Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Mahanagar Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Mahanagar Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Mahanagar Lucknow best sexual serviceanilsa9823
 
Call Girls In Andheri East Call US Pooja📞 9892124323 Book Hot And
Call Girls In Andheri East Call US Pooja📞 9892124323 Book Hot AndCall Girls In Andheri East Call US Pooja📞 9892124323 Book Hot And
Call Girls In Andheri East Call US Pooja📞 9892124323 Book Hot AndPooja Nehwal
 
Call Girls in Kalyan Vihar Delhi 💯 Call Us 🔝8264348440🔝
Call Girls in Kalyan Vihar Delhi 💯 Call Us 🔝8264348440🔝Call Girls in Kalyan Vihar Delhi 💯 Call Us 🔝8264348440🔝
Call Girls in Kalyan Vihar Delhi 💯 Call Us 🔝8264348440🔝soniya singh
 
CALL ON ➥8923113531 🔝Call Girls Aliganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Aliganj Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Aliganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Aliganj Lucknow best sexual serviceanilsa9823
 
LC_YouSaidYes_NewBelieverBookletDone.pdf
LC_YouSaidYes_NewBelieverBookletDone.pdfLC_YouSaidYes_NewBelieverBookletDone.pdf
LC_YouSaidYes_NewBelieverBookletDone.pdfpastor83
 
Understanding Relationship Anarchy: A Guide to Liberating Love | CIO Women Ma...
Understanding Relationship Anarchy: A Guide to Liberating Love | CIO Women Ma...Understanding Relationship Anarchy: A Guide to Liberating Love | CIO Women Ma...
Understanding Relationship Anarchy: A Guide to Liberating Love | CIO Women Ma...CIOWomenMagazine
 
The Selfspace Journal Preview by Mindbrush
The Selfspace Journal Preview by MindbrushThe Selfspace Journal Preview by Mindbrush
The Selfspace Journal Preview by MindbrushShivain97
 
9892124323, Call Girls in mumbai, Vashi Call Girls , Kurla Call girls
9892124323, Call Girls in mumbai, Vashi Call Girls , Kurla Call girls9892124323, Call Girls in mumbai, Vashi Call Girls , Kurla Call girls
9892124323, Call Girls in mumbai, Vashi Call Girls , Kurla Call girlsPooja Nehwal
 
Top Rated Pune Call Girls Tingre Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Tingre Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Tingre Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Tingre Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 

Recently uploaded (20)

8377087607 Full Enjoy @24/7-CLEAN-Call Girls In Chhatarpur,
8377087607 Full Enjoy @24/7-CLEAN-Call Girls In Chhatarpur,8377087607 Full Enjoy @24/7-CLEAN-Call Girls In Chhatarpur,
8377087607 Full Enjoy @24/7-CLEAN-Call Girls In Chhatarpur,
 
Breath, Brain & Beyond_A Holistic Approach to Peak Performance.pdf
Breath, Brain & Beyond_A Holistic Approach to Peak Performance.pdfBreath, Brain & Beyond_A Holistic Approach to Peak Performance.pdf
Breath, Brain & Beyond_A Holistic Approach to Peak Performance.pdf
 
Reinventing Corporate Philanthropy_ Strategies for Meaningful Impact by Leko ...
Reinventing Corporate Philanthropy_ Strategies for Meaningful Impact by Leko ...Reinventing Corporate Philanthropy_ Strategies for Meaningful Impact by Leko ...
Reinventing Corporate Philanthropy_ Strategies for Meaningful Impact by Leko ...
 
Lucknow 💋 High Class Call Girls Lucknow 10k @ I'm VIP Independent Escorts Gir...
Lucknow 💋 High Class Call Girls Lucknow 10k @ I'm VIP Independent Escorts Gir...Lucknow 💋 High Class Call Girls Lucknow 10k @ I'm VIP Independent Escorts Gir...
Lucknow 💋 High Class Call Girls Lucknow 10k @ I'm VIP Independent Escorts Gir...
 
《塔夫斯大学毕业证成绩单购买》做Tufts文凭毕业证成绩单/伪造美国假文凭假毕业证书图片Q微信741003700《塔夫斯大学毕业证购买》《Tufts毕业文...
《塔夫斯大学毕业证成绩单购买》做Tufts文凭毕业证成绩单/伪造美国假文凭假毕业证书图片Q微信741003700《塔夫斯大学毕业证购买》《Tufts毕业文...《塔夫斯大学毕业证成绩单购买》做Tufts文凭毕业证成绩单/伪造美国假文凭假毕业证书图片Q微信741003700《塔夫斯大学毕业证购买》《Tufts毕业文...
《塔夫斯大学毕业证成绩单购买》做Tufts文凭毕业证成绩单/伪造美国假文凭假毕业证书图片Q微信741003700《塔夫斯大学毕业证购买》《Tufts毕业文...
 
call girls in candolim beach 9870370636] NORTH GOA ..
call girls in candolim beach 9870370636] NORTH GOA ..call girls in candolim beach 9870370636] NORTH GOA ..
call girls in candolim beach 9870370636] NORTH GOA ..
 
Call Girls Anjuna beach Mariott Resort ₰8588052666
Call Girls Anjuna beach Mariott Resort ₰8588052666Call Girls Anjuna beach Mariott Resort ₰8588052666
Call Girls Anjuna beach Mariott Resort ₰8588052666
 
Lilac Illustrated Social Psychology Presentation.pptx
Lilac Illustrated Social Psychology Presentation.pptxLilac Illustrated Social Psychology Presentation.pptx
Lilac Illustrated Social Psychology Presentation.pptx
 
REFLECTIONS Newsletter Jan-Jul 2024.pdf.pdf
REFLECTIONS Newsletter Jan-Jul 2024.pdf.pdfREFLECTIONS Newsletter Jan-Jul 2024.pdf.pdf
REFLECTIONS Newsletter Jan-Jul 2024.pdf.pdf
 
CALL ON ➥8923113531 🔝Call Girls Adil Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Adil Nagar Lucknow best Female serviceCALL ON ➥8923113531 🔝Call Girls Adil Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Adil Nagar Lucknow best Female service
 
CALL ON ➥8923113531 🔝Call Girls Mahanagar Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Mahanagar Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Mahanagar Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Mahanagar Lucknow best sexual service
 
Call Girls In Andheri East Call US Pooja📞 9892124323 Book Hot And
Call Girls In Andheri East Call US Pooja📞 9892124323 Book Hot AndCall Girls In Andheri East Call US Pooja📞 9892124323 Book Hot And
Call Girls In Andheri East Call US Pooja📞 9892124323 Book Hot And
 
Call Girls in Kalyan Vihar Delhi 💯 Call Us 🔝8264348440🔝
Call Girls in Kalyan Vihar Delhi 💯 Call Us 🔝8264348440🔝Call Girls in Kalyan Vihar Delhi 💯 Call Us 🔝8264348440🔝
Call Girls in Kalyan Vihar Delhi 💯 Call Us 🔝8264348440🔝
 
CALL ON ➥8923113531 🔝Call Girls Aliganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Aliganj Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Aliganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Aliganj Lucknow best sexual service
 
LC_YouSaidYes_NewBelieverBookletDone.pdf
LC_YouSaidYes_NewBelieverBookletDone.pdfLC_YouSaidYes_NewBelieverBookletDone.pdf
LC_YouSaidYes_NewBelieverBookletDone.pdf
 
Understanding Relationship Anarchy: A Guide to Liberating Love | CIO Women Ma...
Understanding Relationship Anarchy: A Guide to Liberating Love | CIO Women Ma...Understanding Relationship Anarchy: A Guide to Liberating Love | CIO Women Ma...
Understanding Relationship Anarchy: A Guide to Liberating Love | CIO Women Ma...
 
The Selfspace Journal Preview by Mindbrush
The Selfspace Journal Preview by MindbrushThe Selfspace Journal Preview by Mindbrush
The Selfspace Journal Preview by Mindbrush
 
9892124323, Call Girls in mumbai, Vashi Call Girls , Kurla Call girls
9892124323, Call Girls in mumbai, Vashi Call Girls , Kurla Call girls9892124323, Call Girls in mumbai, Vashi Call Girls , Kurla Call girls
9892124323, Call Girls in mumbai, Vashi Call Girls , Kurla Call girls
 
Top Rated Pune Call Girls Tingre Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Tingre Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Tingre Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Tingre Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
escort service sasti (*~Call Girls in Paschim Vihar Metro❤️9953056974
escort service  sasti (*~Call Girls in Paschim Vihar Metro❤️9953056974escort service  sasti (*~Call Girls in Paschim Vihar Metro❤️9953056974
escort service sasti (*~Call Girls in Paschim Vihar Metro❤️9953056974
 

OISF - Continuous Skills Improvement for Everyone

  • 1. Continuous For Everyone Continuous @c3rkah | https://www.linkedin.com/in/mattscheurer/ https://www.slideshare.net/cerkah/ - Matt Scheurer
  • 2. About MeAbout Me I work here: As a Sr. Systems Security Engineer I serve as Chair for the I am also an Ambassador & Security Researcher for
  • 3. ObjectivesObjectives I work here: As a Sr. Systems Security Engineer ● Provide attendees with ideas and options for continuing to expand their Information Security skills – Not all of these ideas will appeal to everyone ● Pick and choose the right ones specifically for you – Examples provided are not exhaustive lists ● There are considerably more resources than I can cover ● If there is something missing, please let me us know!
  • 4. Why (should I do any of this)?Why (should I do any of this)? I work here: As a Sr. Systems Security Engineer ● Developing and improving your skills helps whether... – You are looking for that first career opportunity – Looking to take that next career step – Making impacts to safeguard your own job security – You want to help mentor others – You are looking for ways to give back / get involved
  • 5. Inspirations for this TalkInspirations for this Talk ● Creative workarounds to learning with – Very limited time – Zero training budget ● Free educational sites ● Other conference speakers & talks ● Articles, Blogs, Podcasts, & Videos ● Bugcrowd University ● Personal Experience – Running a monthly local InfoSec meetup group – Mentoring others
  • 6. The Qualification TriangleThe Qualification Triangle ● Experience is typically the most valued by employers ● Triangle doesn’t account for – Luck – Security Clearance – Emotional Intelligence Quotient (EIQ) Experience Education Certification
  • 7. InfoSec Street Cred?InfoSec Street Cred? ● Getting that first opportunity in InfoSec is hard! – Some get lucky with a good co-op or internship ● Equipped with only a degree(s) and/or certifications alone, the world will probably not beat a path to your door in spite of the number of open positions in InfoSec and skills gaps – But I do have some ideas!
  • 8. Standing out from the CrowdStanding out from the Crowd ● Ideas to demonstrate passion and knowledge – Writing – Recording and posting new Tech Videos – Volunteering – Bug Bounties – Teaching Others
  • 9. Writing ExamplesWriting Examples ● Tech Articles ● Tech Blogs ● White Papers ● Event Write-Ups, such as: - Key Takeaways - Lessons Learned
  • 10. Video Lesson ExamplesVideo Lesson Examples ● Record & Post Videos - YouTube Channel? (Maybe Not Right Now) - BitChute or other YouTube alternatives
  • 11. Volunteering ExamplesVolunteering Examples ● Technology Conferences ● Information Security / Hacker Conferences ● Local Tech & InfoSec Meetup Groups - Most groups want help, even if it’s not publicized
  • 12. Teaching Others at...Teaching Others at... ● Conferences ● Meetup Groups ● Webinars ● Workshops ● Brown Bag Lunches ● School Labs ● Library Rooms ● Hallways ● Everywhere Else!
  • 13. Learning & Teaching OpportunitiesLearning & Teaching Opportunities
  • 14. Bug Bounty ProgramsBug Bounty Programs ● Get Paid to Hack Stuff! - Legally and Ethically!!! - Also gain professional experience - And / Or - ● Consider Entering CTF Competitions - Add personal skills and increase proficiency
  • 15. Tying it all TogetherTying it all Together ● Publicly journal the things you learn when you – Take a class, participate in a CTF, attend a workshop, earn a certification, complete an online challenge or course, conduct research, etc.? – Publish a write-up, or post a video recap, or both – Present at local meetup groups & conferences ● Put these activities on your Resume!
  • 16. LearningLearning ● There are plenty of ways to learn new things – And probably more places now than ever before – But I still learn best through hands-on activities and time in the seat ● Let’s look at some free and low cost examples...
  • 17. SEED labsSEED labs The SEED project's objective is to develop hands-on laboratory exercises (called SEED labs) for computer and information security education and help instructors adopt these labs in their curricula. At present, there are over 30 labs available. Web site: https://seedsecuritylabs.org/
  • 18. SEED labs - Software SecuritySEED labs - Software Security ● Buffer Overflow Vulnerability Lab ● Return-to-Libc Attack Lab ● Environment Variable and Set-UID Lab ● Race Condition Vulnerability Lab ● Dirty COW Attack Lab ● Format String Vulnerability Lab ● Shellshock Vulnerability Lab
  • 19. SEED labs - Network SecuritySEED labs - Network Security ● Packet Sniffing and Spoofing Lab ● TCP/IP Attack Lab ● Heartbleed Attack Lab ● Local DNS Attack Lab ● Remote DNS Attack Lab ● Firewall Exploration Lab ● Firewall Evasion Lab ● Virtual Private Network (VPN) Lab
  • 20. SEED labs – More Attack LabsSEED labs – More Attack Labs ● Web Security Labs – Cross-site Scripting Attack Lab – Cross-Site Request Forgery Attack Lab – SQL Injection Attack Lab ● System Security Labs – Meltdown Attack Lab – Spectre Attack Lab
  • 21. SEED labs – Still More LabsSEED labs – Still More Labs ● Cryptography Labs – MD5 Collision Attack Lab – RSA Public-Key Encryption and Signature Lab – Secret Key Encryption Lab – Pseudo Random Number Generation Lab – Public-Key Infrastructure (PKI) Lab ● Mobile Security Labs – Android Repackaging Attack Lab – Android Device Rooting Lab
  • 22. SEED labs CaveatsSEED labs Caveats The online documentation is sparse. You will want to order Dr. Wenliang (Kevin) Du’s accompanying “Computer & Internet Security: A Hands-on Approach” Second Edition book (~$70) to get the most out of these open labs.
  • 23. ENISA Training LabsENISA Training Labs Created by the European Union Agency for Cybersecurity (ENISA), the ENISA CSIRT training material, containing Handbooks for teachers, Toolsets for students and Virtual Images to support hands on training sessions. Web site: https://bit.ly/296L1Ae
  • 24. ENISA Labs – Technical (1/2)ENISA Labs – Technical (1/2) ● Building artifact handling and analysis environment ● Processing and storing artifacts ● Artifact analysis fundamentals ● Advanced artifact handling ● Introduction to advanced artifact analysis ● Dynamic analysis of artifacts ● Static analysis of artifacts ● Forensic analysis: Local Incident Response ● Forensic analysis: Network Incident Response ● Forensic analysis: Web server Analysis ● Developing Countermeasures ● Common framework for artifact analysis activities
  • 25. ENISA Labs – Technical (2/2)ENISA Labs – Technical (2/2) ● Using indicators to enhance defence capabilities ● Identification and handling of electronic evidence ● Digital forensics ● Mobile threats incident handling ● Mobile threats incident handling (Part II) ● Proactive incident detection ● Automation in incident handling ● Introduction to network forensics (New) ● Honeypots ● Vulnerability handling ● Presenting, correlating and filtering various feeds
  • 26. ENISA Training Labs CaveatsENISA Training Labs Caveats These labs are built with a noticeable international focus as created by the EU. GMT lab times are different from USA time zones. Documentation is written in International English not US English. Legal references are not always applicable in the United States.
  • 27. Bugcrowd UniversityBugcrowd University Bugcrowd University is a free and open source project for security, education, and training for the whitehat hacker community. Learn the basics of hacking and bug bounty hunting with videos, tutorials, labs, best practices and more. Web site: https://bit.ly/2NAit8r
  • 28. More Free Hands-On LearningMore Free Hands-On Learning
  • 29. AppSec Hands-On LearningAppSec Hands-On Learning
  • 30. Goal SettingGoal Setting ● If you could do anything you would like in the next 5 years, what would it be? ● List out the steps along the way you think a person would take in order to get there ● Do those things in your action plan
  • 31. Jim Cathcart QuotesJim Cathcart Quotes “Think Like the Person You Intend to Become.” “If You Will Spend One Extra Hour Each Day Studying Your Chosen Field, You’ll Be a National Expert in That Field in Five Years or Less.”
  • 32. Emotional IntelligenceEmotional Intelligence Emotional intelligence (EI), emotional leadership (EL), emotional quotient (EQ) and emotional intelligence quotient (EIQ), is the capability of individuals to recognize their own emotions and those of others, discern between different feelings and label them appropriately, use emotional information to guide thinking and behavior, and manage and/or adjust emotions to adapt to environments or achieve one's goal(s). https://en.wikipedia.org/wiki/Emotional_intelligence
  • 33. Building up those Soft SkillsBuilding up those Soft Skills It may sound too touchy-feely for some at first, but I honestly attribute EIQ for reaching my professional goals. Many studies conclude that people with the highest EIQ typically achieve more success and higher compensation than even the smartest people. There are lots of great articles through the following Google search: improving “emotional intelligence” I recommend bookmarking the one’s most beneficial to you and revisiting them occasionally as refreshers.
  • 34. Mom quotes before EIQ was a thingMom quotes before EIQ was a thing ● “It’s not always what you know, but sometimes who you know.” ● “Always treat others as you would like to be treated.” ● “If you don’t have anything nice to say then you shouldn’t say anything at all.” ● “Nobody cares how much you know until they know how much you care.”
  • 35. My Advice...My Advice... Leave the “Trolling” and flame wars to Orville! CAUTION!
  • 37. ConclusionsConclusions ● Experiment and find what works best for you ● Market yourself well (You’re in charge of your own personal brand)
  • 38. ConclusionsConclusions ● Experiment and find what works best for you ● Market yourself well (You’re in charge of your own personal brand) ● Work hard and share these lessons with others
  • 39. ConclusionsConclusions ● Experiment and find what works best for you ● Market yourself well (You’re in charge of your own personal brand) ● Work hard and share these lessons with others ● Never stop learning or challenging yourself
  • 40. ConclusionsConclusions ● Experiment and find what works best for you ● Market yourself well (You’re in charge of your own personal brand) ● Work hard and share these lessons with others ● Never stop learning or challenging yourself ● Don’t forget those Soft Skills (i.e., EIQ)!
  • 41. QuestionsQuestions Who ... What ... When ... Where ... Why ... How ...
  • 42. Continuous For Everyone Continuous @c3rkah | https://www.linkedin.com/in/mattscheurer/ https://www.slideshare.net/cerkah/ Thank you for attending!