SlideShare una empresa de Scribd logo
1 de 14
Descargar para leer sin conexión
cheating the 10,000-hour rule
(become an expert in information security)
“there is a logic
 behind why
 some people
 become
 successful”
expert performance and deliberate practice
                       k. anders ericsson




   http://www.psy.fsu.edu/faculty/ericsson/ericsson.exp.perf.html
definition of expert
one who has acquired special skill in or knowledge of a particular
subjects through professional training and practical experience
how to spot an expert
experts exhibit their superior performance in public their
behaviour looks so effortless and natural that we are tempted to
attribute it to special talents. 
what makes experts tick?
1. measures of general basic capacities do not predict success
   in a domain
2. the superior performance of experts is often very domain
   specific and transfer outside their narrow area of expertise is
   surprisingly limited
3. systematic differences between experts and less proficient
   individuals nearly always reflect attributes acquired by the
   experts during their lengthy training
experts are made, not born
pro fessional hackers
jim geovedi                                   nal script kiddy
informatio n security troublemaker, professio




http://www.slideshare.net/geovedi/professional-hackers
critical mindset
1   be hungry

2   be in the right circle

3   be a teacher
1   be hungry

2   be in the right circle

3   be a teacher
1   be hungry

2   be in the right circle

3   be a teacher
@geovedi



http://slideshare.net/geovedi • http://linkedin.com/in/geovedi

Más contenido relacionado

Destacado

Is Cyber-offence the New Cyber-defence?
Is Cyber-offence the New Cyber-defence?Is Cyber-offence the New Cyber-defence?
Is Cyber-offence the New Cyber-defence?Jim Geovedi
 
Satellite Hacking — Intro by Indianz (2012)
Satellite Hacking — Intro by Indianz (2012)Satellite Hacking — Intro by Indianz (2012)
Satellite Hacking — Intro by Indianz (2012)Jim Geovedi
 
Professional Hackers
Professional HackersProfessional Hackers
Professional HackersJim Geovedi
 
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship
Hacking a Bird in the Sky: Exploiting Satellite Trust RelationshipHacking a Bird in the Sky: Exploiting Satellite Trust Relationship
Hacking a Bird in the Sky: Exploiting Satellite Trust RelationshipJim Geovedi
 
The 21st Century Bank Job
The 21st Century Bank JobThe 21st Century Bank Job
The 21st Century Bank JobJim Geovedi
 
IDS & Log Management
IDS & Log ManagementIDS & Log Management
IDS & Log ManagementJim Geovedi
 
AI & NLP pada @begobet
AI & NLP pada @begobetAI & NLP pada @begobet
AI & NLP pada @begobetJim Geovedi
 
Wireless Hotspot: The Hackers Playground
Wireless Hotspot: The Hackers PlaygroundWireless Hotspot: The Hackers Playground
Wireless Hotspot: The Hackers PlaygroundJim Geovedi
 
Hacking Satellite: A New Universe to Discover
Hacking Satellite: A New Universe to DiscoverHacking Satellite: A New Universe to Discover
Hacking Satellite: A New Universe to DiscoverJim Geovedi
 
Waluku: Answering Astronomy Questions through Social Media
Waluku: Answering Astronomy Questions through Social MediaWaluku: Answering Astronomy Questions through Social Media
Waluku: Answering Astronomy Questions through Social MediaJim Geovedi
 
Cloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud ComputingCloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud ComputingJim Geovedi
 
HITB Labs: Practical Attacks Against 3G/4G Telecommunication Networks
HITB Labs: Practical Attacks Against 3G/4G Telecommunication NetworksHITB Labs: Practical Attacks Against 3G/4G Telecommunication Networks
HITB Labs: Practical Attacks Against 3G/4G Telecommunication NetworksJim Geovedi
 

Destacado (14)

Is Cyber-offence the New Cyber-defence?
Is Cyber-offence the New Cyber-defence?Is Cyber-offence the New Cyber-defence?
Is Cyber-offence the New Cyber-defence?
 
Satellite Hacking — Intro by Indianz (2012)
Satellite Hacking — Intro by Indianz (2012)Satellite Hacking — Intro by Indianz (2012)
Satellite Hacking — Intro by Indianz (2012)
 
Professional Hackers
Professional HackersProfessional Hackers
Professional Hackers
 
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship
Hacking a Bird in the Sky: Exploiting Satellite Trust RelationshipHacking a Bird in the Sky: Exploiting Satellite Trust Relationship
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship
 
The 21st Century Bank Job
The 21st Century Bank JobThe 21st Century Bank Job
The 21st Century Bank Job
 
IDS & Log Management
IDS & Log ManagementIDS & Log Management
IDS & Log Management
 
AI & NLP pada @begobet
AI & NLP pada @begobetAI & NLP pada @begobet
AI & NLP pada @begobet
 
Hacking Trust
Hacking TrustHacking Trust
Hacking Trust
 
Wireless Hotspot: The Hackers Playground
Wireless Hotspot: The Hackers PlaygroundWireless Hotspot: The Hackers Playground
Wireless Hotspot: The Hackers Playground
 
Internet Worms
Internet WormsInternet Worms
Internet Worms
 
Hacking Satellite: A New Universe to Discover
Hacking Satellite: A New Universe to DiscoverHacking Satellite: A New Universe to Discover
Hacking Satellite: A New Universe to Discover
 
Waluku: Answering Astronomy Questions through Social Media
Waluku: Answering Astronomy Questions through Social MediaWaluku: Answering Astronomy Questions through Social Media
Waluku: Answering Astronomy Questions through Social Media
 
Cloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud ComputingCloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud Computing
 
HITB Labs: Practical Attacks Against 3G/4G Telecommunication Networks
HITB Labs: Practical Attacks Against 3G/4G Telecommunication NetworksHITB Labs: Practical Attacks Against 3G/4G Telecommunication Networks
HITB Labs: Practical Attacks Against 3G/4G Telecommunication Networks
 

Similar a Cheating the 10,000 hour rule

Advanced Certificate in Security Management
Advanced Certificate in Security ManagementAdvanced Certificate in Security Management
Advanced Certificate in Security Management360 BSI
 
Information Security Management Education Program - Concept Document
Information Security Management Education Program - Concept Document Information Security Management Education Program - Concept Document
Information Security Management Education Program - Concept Document Dinesh O Bareja
 
Integrated Work Experience Strategy
Integrated Work Experience Strategy Integrated Work Experience Strategy
Integrated Work Experience Strategy Vijayananda Mohire
 
3. How-to-define-a-Competency-Competency-statements-that-work.pdf
3. How-to-define-a-Competency-Competency-statements-that-work.pdf3. How-to-define-a-Competency-Competency-statements-that-work.pdf
3. How-to-define-a-Competency-Competency-statements-that-work.pdfnguyenanvuong2007
 
Mapping Your Career in Physical Security
Mapping Your Career in Physical SecurityMapping Your Career in Physical Security
Mapping Your Career in Physical Securityguidepostsolutions
 
Talent and development
Talent and developmentTalent and development
Talent and developmentPekka Suominen
 
Presentation on "Knowledge acquisition & validation"
  Presentation on "Knowledge acquisition & validation"  Presentation on "Knowledge acquisition & validation"
Presentation on "Knowledge acquisition & validation"Aditya Sarkar
 
Knowledge management
Knowledge managementKnowledge management
Knowledge managementLibra chudry
 
WORKSHOP: Performance Effectiveness, by Rahila Narejo
WORKSHOP: Performance Effectiveness, by Rahila NarejoWORKSHOP: Performance Effectiveness, by Rahila Narejo
WORKSHOP: Performance Effectiveness, by Rahila Narejo♚ MBT- Khalid ♞
 
Knowledge Risk & Retention Kmlf Presentation 24 February 2010 Dr Kate Andrews
Knowledge Risk & Retention   Kmlf Presentation 24 February 2010 Dr Kate AndrewsKnowledge Risk & Retention   Kmlf Presentation 24 February 2010 Dr Kate Andrews
Knowledge Risk & Retention Kmlf Presentation 24 February 2010 Dr Kate Andrewsknowable
 
Why Smart Employees Underperform
Why Smart Employees UnderperformWhy Smart Employees Underperform
Why Smart Employees Underperformmother55
 
Storytelling for research software engineers
Storytelling for research software engineersStorytelling for research software engineers
Storytelling for research software engineersAlbanLevy
 
Defend the Digital Frontier: The Pinnacle of CEH Training in Jaipur
Defend the Digital Frontier: The Pinnacle of CEH Training in JaipurDefend the Digital Frontier: The Pinnacle of CEH Training in Jaipur
Defend the Digital Frontier: The Pinnacle of CEH Training in Jaipurccasociety1
 
Market Research
Market ResearchMarket Research
Market Researchtrilogy
 
The expert as leader - stories from our latest research - webinar
The expert as leader - stories from our latest research - webinarThe expert as leader - stories from our latest research - webinar
The expert as leader - stories from our latest research - webinarRoffey Park
 
Deep sec talk - Addressing the skills gap
Deep sec talk - Addressing the skills gapDeep sec talk - Addressing the skills gap
Deep sec talk - Addressing the skills gapColin McLean
 
1448952279-Industry Expectations from Engineering Graduates.pptx
1448952279-Industry Expectations from Engineering Graduates.pptx1448952279-Industry Expectations from Engineering Graduates.pptx
1448952279-Industry Expectations from Engineering Graduates.pptxmerlyndsouza7980
 

Similar a Cheating the 10,000 hour rule (20)

Advanced Certificate in Security Management
Advanced Certificate in Security ManagementAdvanced Certificate in Security Management
Advanced Certificate in Security Management
 
Information Security Management Education Program - Concept Document
Information Security Management Education Program - Concept Document Information Security Management Education Program - Concept Document
Information Security Management Education Program - Concept Document
 
Integrated Work Experience Strategy
Integrated Work Experience Strategy Integrated Work Experience Strategy
Integrated Work Experience Strategy
 
3. How-to-define-a-Competency-Competency-statements-that-work.pdf
3. How-to-define-a-Competency-Competency-statements-that-work.pdf3. How-to-define-a-Competency-Competency-statements-that-work.pdf
3. How-to-define-a-Competency-Competency-statements-that-work.pdf
 
Mapping Your Career in Physical Security
Mapping Your Career in Physical SecurityMapping Your Career in Physical Security
Mapping Your Career in Physical Security
 
Talent and development
Talent and developmentTalent and development
Talent and development
 
Presentation on "Knowledge acquisition & validation"
  Presentation on "Knowledge acquisition & validation"  Presentation on "Knowledge acquisition & validation"
Presentation on "Knowledge acquisition & validation"
 
Knowledge management
Knowledge managementKnowledge management
Knowledge management
 
WORKSHOP: Performance Effectiveness, by Rahila Narejo
WORKSHOP: Performance Effectiveness, by Rahila NarejoWORKSHOP: Performance Effectiveness, by Rahila Narejo
WORKSHOP: Performance Effectiveness, by Rahila Narejo
 
Knowledge Risk & Retention Kmlf Presentation 24 February 2010 Dr Kate Andrews
Knowledge Risk & Retention   Kmlf Presentation 24 February 2010 Dr Kate AndrewsKnowledge Risk & Retention   Kmlf Presentation 24 February 2010 Dr Kate Andrews
Knowledge Risk & Retention Kmlf Presentation 24 February 2010 Dr Kate Andrews
 
Professionalism
ProfessionalismProfessionalism
Professionalism
 
Why Smart Employees Underperform
Why Smart Employees UnderperformWhy Smart Employees Underperform
Why Smart Employees Underperform
 
Storytelling for research software engineers
Storytelling for research software engineersStorytelling for research software engineers
Storytelling for research software engineers
 
EBMgt Course Module 3: Why Do We Need It?
EBMgt Course Module 3: Why Do We Need It?EBMgt Course Module 3: Why Do We Need It?
EBMgt Course Module 3: Why Do We Need It?
 
Defend the Digital Frontier: The Pinnacle of CEH Training in Jaipur
Defend the Digital Frontier: The Pinnacle of CEH Training in JaipurDefend the Digital Frontier: The Pinnacle of CEH Training in Jaipur
Defend the Digital Frontier: The Pinnacle of CEH Training in Jaipur
 
Market Research
Market ResearchMarket Research
Market Research
 
The expert as leader - stories from our latest research - webinar
The expert as leader - stories from our latest research - webinarThe expert as leader - stories from our latest research - webinar
The expert as leader - stories from our latest research - webinar
 
Deep sec talk - Addressing the skills gap
Deep sec talk - Addressing the skills gapDeep sec talk - Addressing the skills gap
Deep sec talk - Addressing the skills gap
 
CV for JC Hill
CV for JC HillCV for JC Hill
CV for JC Hill
 
1448952279-Industry Expectations from Engineering Graduates.pptx
1448952279-Industry Expectations from Engineering Graduates.pptx1448952279-Industry Expectations from Engineering Graduates.pptx
1448952279-Industry Expectations from Engineering Graduates.pptx
 

Último

Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 

Último (20)

Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 

Cheating the 10,000 hour rule

  • 1. cheating the 10,000-hour rule (become an expert in information security)
  • 2. “there is a logic behind why some people become successful”
  • 3. expert performance and deliberate practice k. anders ericsson http://www.psy.fsu.edu/faculty/ericsson/ericsson.exp.perf.html
  • 4. definition of expert one who has acquired special skill in or knowledge of a particular subjects through professional training and practical experience
  • 5. how to spot an expert experts exhibit their superior performance in public their behaviour looks so effortless and natural that we are tempted to attribute it to special talents. 
  • 6. what makes experts tick? 1. measures of general basic capacities do not predict success in a domain 2. the superior performance of experts is often very domain specific and transfer outside their narrow area of expertise is surprisingly limited 3. systematic differences between experts and less proficient individuals nearly always reflect attributes acquired by the experts during their lengthy training
  • 7. experts are made, not born
  • 8.
  • 9. pro fessional hackers jim geovedi nal script kiddy informatio n security troublemaker, professio http://www.slideshare.net/geovedi/professional-hackers
  • 11. 1 be hungry 2 be in the right circle 3 be a teacher
  • 12. 1 be hungry 2 be in the right circle 3 be a teacher
  • 13. 1 be hungry 2 be in the right circle 3 be a teacher