— Business Updates and Personal Check-ins
Quick recap. The meeting began with Shawn Nunley sharing audio clips with abstract lyrics before transitioning into personal and professional updates from various team members, including discussions about business planning and website development. The group then explored technical concepts around API enumeration and interrogation, followed by an in-depth discussion about recent cybersecurity incidents and their impacts on organizations of different sizes. The conversation ended with conversations about cybersecurity services for mid-sized businesses, strategies for introducing security concepts to organizations, and reflections on career paths in cybersecurity, including challenges faced by individuals in security and technical roles.
Show 8 discussion topics
Business Updates and Personal Check-ins
The group discussed various personal and professional updates. Dave shared his struggles with writing a business plan and mentioned hiring a project manager to help him stay focused. Kyle talked about adding a new page to the Mindset Dojo website to attract non-technical contributors and mentioned implementing an HTML proofer as a quality gate. The conversation then shifted to a more informal "therapy" session, where participants shared personal anecdotes and checked in with each other.
API Enumerating vs Interrogating Discussion
The group discussed the difference between enumerating and interrogating APIs, with Neil suggesting that enumerating is listing out API components while interrogating involves probing and investigating further. They agreed that the terms are often used interchangeably, especially in the context of cloud service providers. Jay proposed the term "discovery" as a more positive alternative, emphasizing the exploratory nature of the process. The discussion also touched on the multi-step process of first enumerating to identify what to interrogate, and then building relationships between different components.
Ransomware Impact and Response Strategies
The meeting focused on recent cybersecurity incidents, particularly the ransomware attack on Jaguar that has severely impacted their production lines and supply chain, with Jay noting it could require a UK government bailout. The discussion also covered the MGM hack, where a 15-year-old and his group caused $100-200 million in damages, and the team explored how organizations handle security incidents, with Neil and Jay explaining that larger companies have established processes and calm response teams while smaller organizations often struggle with panic and unpreparedness.
Mid-Sized Business Cybersecurity Services
The group discussed cybersecurity services for mid-sized businesses, with Neil and others noting that while Mandiant and similar high-end services are expensive, there's significant scope for incident support and managed SOC services that can provide expertise and tools that smaller organizations couldn't afford on their own. The discussion highlighted that security needs vary widely based on business context and risk profile, with service providers requiring more sophisticated security measures than traditional businesses. The conversation also touched on how many mid-sized companies only establish security functions after experiencing an incident, and Kimberly shared insights about the differences between MSPs and MSSPs, noting that many MSPs often lack deep security expertise but can benefit from specialized security tools and training.
Security Communication Strategies for Executives
The group discussed strategies for introducing new ideas and security concepts to organizations, emphasizing the importance of storytelling and understanding business outcomes rather than using fear-based approaches. They shared various techniques, including asking strategic questions, connecting with risk teams, and framing security discussions in terms of business impact. The conversation highlighted the need for effective communication and building trust with executives, with suggestions to use mentorship opportunities and focus on value-based rather than fear-based messaging.
Career Journeys in Cybersecurity
The conversation ended with participants reflecting on their diverse career paths into cybersecurity, highlighting the importance of communication and adaptability across different professional environments. Jay emphasized the value of understanding business contexts and connecting with non-technical audiences, while J. Louis shared his journey from hacking video games to cybersecurity, expressing interest in transitioning to consulting. The group discussed challenges in cybersecurity, including the difficulty of convincing organizations to prioritize security, and the need for individuals to develop broader skills beyond technical expertise.
Security Roles and Resource Challenges
The group discussed challenges in security and technical roles, particularly for smaller organizations and non-profits. jlewi shared their experience leaving a position where they had taken on too much responsibility, realizing they needed to balance their desire to implement security measures with the organization's limited resources and understanding. Matt and Jay offered insights about security cultures in different environments and the importance of not doing all the work oneself, as it creates unsustainable situations when the person leaves.
Career Challenges and Note-Taking Strategies
The group discussed jlewi's career challenges and learning approach. jlewi expressed frustration about being unable to secure employment despite extensive job applications, and explained that AWS security certification and a bachelor's degree are currently helping him get past HR screens. The discussion explored different note-taking methods, with Matt and Neil suggesting that jlewi connect with Dave Gargan about using OneNote effectively, while Jay shared his experience of taking high-level notes that help him remember key concepts. The conversation ended with Jay announcing he would miss the following week's meeting due to travel to Copenhagen.