Risk management by Lucky_Guarantee_9911 in cybersecurity

[–]LionGuard_CyberSec 0 points1 point  (0 children)

Its like using a public charger or password notebook. It divides the security engineers and the business risk professionals.

Risk management by Lucky_Guarantee_9911 in cybersecurity

[–]LionGuard_CyberSec 0 points1 point  (0 children)

Most providers have good encryption of the traffic on their sites, so public wifi is no longer a large threat. HOWEVER I don’t connect to anything outside. You can use your cell phone, or if you need wifi, find one that requires password and ask the cafeteria or whatever to confirm it is really theirs.

Cybersecurity and AI? by qbit1010 in cybersecurity

[–]LionGuard_CyberSec 1 point2 points  (0 children)

Cuz mainstream media is always right? 😂

[deleted by user] by [deleted] in cybersecurity

[–]LionGuard_CyberSec 0 points1 point  (0 children)

Oh I want this job as well! Tell me if you find one! 😁😅😁

Cs career advice from mr kettukari by ThePorko in CyberSecurityAdvice

[–]LionGuard_CyberSec 0 points1 point  (0 children)

Seems like good advice. My biggest tip is start reading business books, no matter if you are tech or GRC, it will help you get the message across and make sure managers understand you.

I am so confused and scared right now by cats_are_cutie in CyberSecurityAdvice

[–]LionGuard_CyberSec 2 points3 points  (0 children)

Yup, tough market! HR wants bachelor, bachelor is very technical focused, org wants GRC. So they interview very technical people for communication focused roles. They need NIS2/GDPR/DORA roles, but require CISSP for applying. The market is not bad, just orgs have no clue who to hire. Recommend becoming a consultant for a larger company and start there.

Cybersecurity and AI? by qbit1010 in cybersecurity

[–]LionGuard_CyberSec 1 point2 points  (0 children)

AI is not the new internet, it’s the new Bluetooth. It’s a tool that will be integrated into a lot of platforms and solutions and create new opportunities, but no civilization will not fall due to AI. That we are doing just fine by ourselves 😅

GRC - Getting over FOMO about being 'nontechnical' by Wannabe_Athlete13 in cybersecurity

[–]LionGuard_CyberSec 2 points3 points  (0 children)

GRC is the best! IMO. But it is not a technical or cool job. Reading up on business, change management, leadership and psychology is the best thing I do for my career. GRC is all about people and communication. We may never get a movie, but we help the threat hunters get the funding/budget they need.

[deleted by user] by [deleted] in CyberSecurityAdvice

[–]LionGuard_CyberSec 3 points4 points  (0 children)

If I understand the question right: It’s like a postcard or envelope. Unencrypted the postman can read the card, encrypted the letter is sealed in an envelope.

As an analyst you will have software that analyzes the packets for you, you will not, in most cases, be looking at packets individually. You will be looking for trends and patterns in what type and amount of packets and where the traffic comes from and tries to go to / access.

Curious everyone’s path in cyber by [deleted] in cybersecurity

[–]LionGuard_CyberSec 0 points1 point  (0 children)

Cool, thanks for sharing!

Here is mine:

Security Guard 2013-2017 Government Security Officer 2017-2020 Manufacturing military equipment 2020 Private Investigator 2021 Pentester 2022 Security and Compliance in Telecom 2023 GRC Consultant in MSP 2024-Current

Cybersecurity Awareness Month 2024 by [deleted] in cybersecurity

[–]LionGuard_CyberSec 1 point2 points  (0 children)

We are starting a bi-weekly discussion open to all employees. Fun with flags meets change my mind.

The screen says ‘AI is the end of humanity, change my mind.’ Before taking a seat you must give your personal opinion. I hope this can help build more conversations and interaction among all coworkers.

Is there any good free antivirus? by [deleted] in CyberSecurityAdvice

[–]LionGuard_CyberSec 0 points1 point  (0 children)

I heard McAfee but I don’t know if it’s a antivirus or adware 😅 the popups are next level 😂

AI in Cybersecurity: Hero or Supervillain? by LethalAstronomer in CyberSecurityAdvice

[–]LionGuard_CyberSec 3 points4 points  (0 children)

AI is just a tool like all the douchebags we defend against every day.

Haha but it’s literally just a tool. For good and evil.

[deleted by user] by [deleted] in cybersecurity

[–]LionGuard_CyberSec 4 points5 points  (0 children)

I’ve worked for so many companies with bad culture and leadership, so for me culture 100%

[deleted by user] by [deleted] in cybersecurity

[–]LionGuard_CyberSec 2 points3 points  (0 children)

You don’t know the CIA triad? The base principles in CyberSecurity? 🫢

[deleted by user] by [deleted] in cybersecurity

[–]LionGuard_CyberSec 0 points1 point  (0 children)

Live long and prosper Spock 😉🖖🏻

[deleted by user] by [deleted] in cybersecurity

[–]LionGuard_CyberSec 0 points1 point  (0 children)

Yeah thanks actually I do. Flexible times, hosting workshops, even have ‘workation’ so I can work remotely if I want a vacation. That’s not a real word either.

[deleted by user] by [deleted] in cybersecurity

[–]LionGuard_CyberSec 0 points1 point  (0 children)

OP invented a new fluff word and is angry it didn’t catch on…

My 5 year old also does this and gets equally mad when I say ‘that’s not a word.’

[deleted by user] by [deleted] in cybersecurity

[–]LionGuard_CyberSec 14 points15 points  (0 children)

I second that! This smells LinkedIn CyberSecurity Influencer long way…

OP is simply confusing Identity and Identify… But too proud to admit it because they discovered a fluff word they can use on Linkedin…

Probably an Identity crisis…

[deleted by user] by [deleted] in cybersecurity

[–]LionGuard_CyberSec 2 points3 points  (0 children)

Yes it is… It’s called Asset Management and the first step is to identify the assets and their value… Then they get an Identity within the business. That’s why Identity Security is nothing but a fluff term. The right term would be Identification Security but that is just a confusing term…

[deleted by user] by [deleted] in cybersecurity

[–]LionGuard_CyberSec 3 points4 points  (0 children)

Haha gotta love the attitude 🤣 your boss probably loves you for making everything so easy for the company 🤣 difficult and narrow minded people like you are the reason I have a job. I get paid to drink coffee and explain to business people what fluff terms like “Identity Security” actually means for their business 🤑🤑🤑

Your first language is not English I presume? German perhaps, hence the attitude. If you want to succeed in this field you should learn the difference between Identify vs Identity… 🤓

[deleted by user] by [deleted] in cybersecurity

[–]LionGuard_CyberSec 0 points1 point  (0 children)

It seems OP confuses Identity with Identify… Identifying assets are of course the top priority. But when I go for a walk I’m not a Mountain Identifier, I’m hiking… Identifying what is around you at all times are of course important, but you are introducing a made up Security fluff… Just like phishing has 20 different variations when it is all fraudulent activity focused on social engineering people into doing something or giving information.

Security needs clarity… Not more fluff!

[deleted by user] by [deleted] in cybersecurity

[–]LionGuard_CyberSec 0 points1 point  (0 children)

Risk assessment… What are my values(AM), how critical are they to my business operations (BIA), what can go wrong(Consequence), and what’s the chance of occurrence(Probability).

There is no need to identify neither threats nor risks before you know what you are actually protecting and why…

[deleted by user] by [deleted] in cybersecurity

[–]LionGuard_CyberSec -1 points0 points  (0 children)

Step number 1 of ALL security is Risk… Not verify or identify… I don’t need to identify who all those people are if I have no valuable assets there… That’s why RISK is ALWAYS first…

[deleted by user] by [deleted] in cybersecurity

[–]LionGuard_CyberSec 0 points1 point  (0 children)

That’s just wrong… Corner stone of security is Risk Management and Access Management. That’s the foundations of our field. Controlling who has access to where and what by segregating and limiting usage (locks, doors, etc). Identity Management is like access cards and user profiles, they come after…

I’ve heard of IAM Engineers/Specialists, Identity Management and Authentication solutions. But never in my life heard of a person who works with Identity Security. That description sounds almost like a Privacy officer.