The Cyber-Hobbit:There and Back Again in CTI
"The Cyber-Hobbit: There and Back Again in CTI" intertwines the classic tale of "The Hobbit" with the modern challenges and opportunities of the cyber threat intelligence world; providing valuable insights for those embarking on this unexpected journey, and mentors seeking to bring new talent to the field.
Highlighted Takeaways:
-Embrace the Unexpected: Just as Bilbo's journey began unexpectedly, be open to opportunities that may lead you into the world of cybersecurity and threat intelligence.
-Seek Guidance: Mentors and advisors play a critical role in your journey. Reach out for guidance and mentorship in the cybersecurity field.
-Adapt to Challenges: Cybersecurity, like Bilbo's adventures, involves facing unforeseen challenges. Be prepared to adapt and learn as you encounter new threats.
Specialized Training: Develop specialized skills through training and education to excel in the field of cyber threat intelligence.
Hands-On Experience: Gain practical experience through projects and internships to apply your knowledge in real-world scenarios.
Career Growth: Recognize that personal growth and progression are natural in cybersecurity, as you move from entry-level positions to more advanced roles.
Apply Knowledge: Like Bilbo's return to the Shire, use your skills and expertise to protect digital realms and make a real impact in cybersecurity.
Exploring these parallels shows how the journey of Bilbo Baggins in The Hobbit aligns with the journey of a college student aspiring to enter the field of cyber threat intelligence, highlighting the challenges, growth, and transformation that occur along the way.
View upcoming Summits: http://www.sans.org/u/DuS
SANS Cyber Threat Intelligence Summit 2024
The Cyber-Hobbit:There and Back Again in CTI
Chandler McClellan, Student, Threat Intelligence Research Intern
Видео The Cyber-Hobbit:There and Back Again in CTI канала SANS Digital Forensics and Incident Response
Highlighted Takeaways:
-Embrace the Unexpected: Just as Bilbo's journey began unexpectedly, be open to opportunities that may lead you into the world of cybersecurity and threat intelligence.
-Seek Guidance: Mentors and advisors play a critical role in your journey. Reach out for guidance and mentorship in the cybersecurity field.
-Adapt to Challenges: Cybersecurity, like Bilbo's adventures, involves facing unforeseen challenges. Be prepared to adapt and learn as you encounter new threats.
Specialized Training: Develop specialized skills through training and education to excel in the field of cyber threat intelligence.
Hands-On Experience: Gain practical experience through projects and internships to apply your knowledge in real-world scenarios.
Career Growth: Recognize that personal growth and progression are natural in cybersecurity, as you move from entry-level positions to more advanced roles.
Apply Knowledge: Like Bilbo's return to the Shire, use your skills and expertise to protect digital realms and make a real impact in cybersecurity.
Exploring these parallels shows how the journey of Bilbo Baggins in The Hobbit aligns with the journey of a college student aspiring to enter the field of cyber threat intelligence, highlighting the challenges, growth, and transformation that occur along the way.
View upcoming Summits: http://www.sans.org/u/DuS
SANS Cyber Threat Intelligence Summit 2024
The Cyber-Hobbit:There and Back Again in CTI
Chandler McClellan, Student, Threat Intelligence Research Intern
Видео The Cyber-Hobbit:There and Back Again in CTI канала SANS Digital Forensics and Incident Response
Показать
Комментарии отсутствуют
Информация о видео
20 февраля 2024 г. 6:37:56
00:34:27
Другие видео канала
![Episode 129: Encryption - Part 5](https://i.ytimg.com/vi/rzi1daXMxAY/default.jpg)
![Detecting Malicious Actors in Google Workspace](https://i.ytimg.com/vi/HzuVhbpO_go/default.jpg)
![Deciphering Browser Hieroglyphics - SANS Digital Forensics and Incident Response Summit 2017](https://i.ytimg.com/vi/LnhSTZgzKuY/default.jpg)
![Why take FOR585: Smartphone Forensic Analysis In-Depth OnDemand](https://i.ytimg.com/vi/4pZHdsOdAVk/default.jpg)
![Episode 61: Selecting a bulletproof password](https://i.ytimg.com/vi/tNhftPyso04/default.jpg)
![SaaS Hunting | 2020 Threat Hunting & Incident Response Summit](https://i.ytimg.com/vi/boW-yAArbTo/default.jpg)
![How has FOR578 - Cyber Threat Intelligence helped you in your current job?](https://i.ytimg.com/vi/3OIThCrQItU/default.jpg)
![Forensic Analysis of sUAS aka Drones - SANS DFIR Summit 2015](https://i.ytimg.com/vi/36rZy9V_avo/default.jpg)
![Episode 156: IPv4 - Part 2](https://i.ytimg.com/vi/RTYpg3_begQ/default.jpg)
![Episode 128: Encryption - Part 4](https://i.ytimg.com/vi/3nMCkmkPSSA/default.jpg)
![SANS Threat Analysis Rundown (STAR)](https://i.ytimg.com/vi/MApq8mSGZUk/default.jpg)
![Tracking Traces of Deleted Applications - SANS DFIR Summit 2019](https://i.ytimg.com/vi/4LcQm4ErXpA/default.jpg)
![Episode 38: What is the defense expert’s role - Part 4](https://i.ytimg.com/vi/abWENFCJz0Y/default.jpg)
![Episode 155: IPv4 - Part 1](https://i.ytimg.com/vi/DqeZMIL2iVM/default.jpg)
![Episode 102: USB Forensics Series - Part 4 of 7](https://i.ytimg.com/vi/Uws4XYDZFwI/default.jpg)
![SANS Threat Analysis Rundown (STAR)](https://i.ytimg.com/vi/h6dJozJuLS0/default.jpg)
![SANS Threat Analysis Rundown (STAR)](https://i.ytimg.com/vi/oIvCYMCFFzU/default.jpg)
![Cracking the Beacon: Automating The Extraction of Implant Configurations](https://i.ytimg.com/vi/3NzCysnltNg/default.jpg)
![SANS DFIR WEBCAST: Smartphone Forensics Moves Fast. Stay Current or You May Miss Relevant Evidence!](https://i.ytimg.com/vi/E0P9IzJJIsU/default.jpg)
![FOR585 Course Animation: Solid State Memory Properties](https://i.ytimg.com/vi/LvmiAuV6PJA/default.jpg)
![Not That Kind of Vulnerability! - Human Trafficking During Coronavirus](https://i.ytimg.com/vi/JeWSliMr22I/default.jpg)