Plugging into Cyber Security

Plugging into Cyber Security

Presented at the Spokane Mayor's Cup Capture the Flag cyber security competition at Spokane Falls Community College to both high school and college student participants.

9c8cde99aae7d37f4a784226bd40b8c3?s=128

Rebecca Long

February 08, 2020
Tweet

Transcript

  1. Plugging Into Cyber Security Rebecca Long | @amaya30 Future Ada,

    President & Founder | @futureada RiskLens, Lead DevOps Engineer | @risklens Spokane Mayor’s Cup CTF February 8, 2020
  2. Overview • Introductions • Getting Plugged in During School •

    Deepen Your Education • Get Certified • Network with Local Professionals • Continue Training & Networking • Closing Tips & Tricks Rebecca Long / Future Ada | @amaya30 / @futureada
  3. Who am I? • Rebecca Long / @amaya30 • Bachelor’s

    & Master’s in Computer Science from Eastern Washington University • 15 years in software engineering focused on quality assurance and DevOps • Founder / President of Future Ada • Lead DevOps Engineer at RiskLens Rebecca Long / Future Ada | @amaya30 / @futureada
  4. Who is Future Ada? • Spokane based 501c3 non-profit advocating

    for diversity & inclusion in STEAM (science, technology, engineering, art, & math) • Founded in 2017 • Named after Ada Lovelace – famous mathematician & first computer programmer • Made up of a current 5 member board and a strong pool of volunteers • Member of the Electronic Frontier Alliance (EFA) – organization of the Electronic Frontier Foundation (EFF) Rebecca Long / Future Ada | @amaya30 / @futureada
  5. Why STEAM vs STEM? • Science, technology, engineering, art, and

    mathematics (STEAM) are the industries leading the charge into the future • Art brings creativity and inclusivity to STEM fields • Art pushes STEM professionals to think outside the box when problem solving Rebecca Long / Future Ada | @amaya30 / @futureada
  6. What are our values? Rebecca Long / Future Ada |

    @amaya30 / @futureada Inclusion Diversity Collaboration Creativity Innovation Empowerment Representation Security
  7. None
  8. “ ” “Social engineering uses influence and persuasion to deceive

    people by convincing them that the social engineer is someone he is not, or by manipulation. As a result, the social engineer is able to take advantage of people to obtain information with or without the use of technology” Kevin Mitnick
  9. “ ” “…the exploitation of psychological triggers and cognitive biases

    as a means to gain unauthorized access to information or information systems D. P. Twitchell, assistant professor at Illinois State University and information assurance and security researcher
  10. My Social Engineering Background • Master’s thesis in cyber-security focused

    on social engineering & phishing • Using Phishing To Test Social Engineering Awareness Of Financial Employees • Partnered with Intrinium and a local bank to perform social engineering training and phishing experiments on real employees • 3 rounds of phishing resulting in 2 & 3% of employees providing sensitive information • Presented at SEVillage at DEFCON 27 • Hacking Your Career Through Social Engineering
  11. Get Plugged Into Cyber Security

  12. During School • Join a program: • Cyber Patriots •

    Skills USA • Find competitions to participate in
  13. Deepen Your Education

  14. Computer Science Degrees • Eastern Washington University – bachelors &

    masters https://www.ewu.edu/cstem/computer-science/ • Gonzaga University – bachelors https://www.gonzaga.edu/school-of-engineering-applied-science/degrees- and-programs/computer-science • Whitworth University – bachelors https://www.whitworth.edu/cms/academics/undergraduate-majors-and- programs/computer-science-ba-bs/
  15. Cyber Security Specific • Spokane Falls Community College – associates

    & bachelors https://sfcc.spokane.edu/What-to-Study/Bachelors/Cybersecurity-Bachelor- of-Applied-Science • Western Governor's University – bachelors & masters https://www.wgu.edu/online-it-degrees/cybersecurity-information- assurance-bachelors-program.html • University of Washington – certificate, bachelors & masters https://www.uwb.edu/ciac/academics-and-programs • SANS Academy – women, diversity & veteran programs https://www.sans.org/cybertalent/cybersecurity-career/womens-academy
  16. Get Certified • CompTIA Security+ • Global Information Assurance Certification

    (GIAC) • Certified Information Systems Security Professional (CISSP)
  17. Network with Local Professionals • DC509 • Spokane 2600 •

    Information Systems Security Association (ISSA) • Community Security Coalition
  18. Continue Your Training & Networking • DEFCON • Diana Initiative

    • BSides • Layer 8
  19. Closing Tips & Tricks • Always be curious • Understand

    more than the tool you are using • Remember there is always a human element to everything • Don’t be afraid to learn, grow and experiment • Just stay within ethical boundaries!
  20. Connect with me! • Rebecca Long • https://rebeccalong.tech • Social:

    @amaya30 • Future Ada • hello@futureada.org • https://futureada.org • Social: @futureada Rebecca Long / Future Ada | @amaya30 / @futureada
  21. Thank you! Rebecca Long / Future Ada | @amaya30 /

    @futureada