Hackers Wanted - Part I
https://www.ted.com/talks/ron_woerner_hackers_wanted

Hackers Wanted - Part I

This is Part I of a two-part series based on my TEDx talk, “Hackers Wanted.” 

Part I: The world needs more hackers.

I’m a hacker. Yeah, that’s right. I admit it. I’m a hacker. I’m also a nerd, a geek and a techie too. I have been all my life. Who’s with me? Are there other hackers out there? Are you willing to admit you’re one?

Hackers make the lay-person nervous, mainly because they don’t know who we really are. There’s a negative connotation about hackers and hacking. It’s time we reframe that viewpoint, because

THE WORLD NEEDS MORE HACKERS!

I’ll start by explaining what and who hackers are; focusing on the good kind. A hacker is someone who’s innately curious, solving problems in unique ways. According to the Hacker Dictionary, written in the 90’s, a hacker is, “One who enjoys the intellectual challenge of creatively overcoming or circumventing limitations.” 

How many TED talks have you seen where someone does exactly that?

Mythbusters from https://en.wikipedia.org/wiki/File:MythBusters_title_screen.jpg

MacGyver is a quintessential example of a hacker. When he opens a suitcase with a paperclip, that’s hacking. Mythbusters Adam SavageJamie Hyneman are others. It’s about having hacker traits like tenacity, creativity, critical thinking and figuring out solutions no matter how many roadblocks you encounter. Shouldn’t we be teaching this in our schools? We need to because the world needs more people with hacker traits.

Anyone can be a hacker.

It isn’t about a particular gender, age, race, social status, what you wear – hoodie vs suit, or even the technologies you use to hack. There are many hackers in our midst who just don’t know it. Heck, most of the people on the Internet use the world’s #1 hacker tool and don’t even realize it.

Do you know what it is? Google. Yeah, Google is the internet’s vacuum cleaner sucking up info from all over. We all use it for research, exploration and reconnaissance, including and maybe especially hackers. Congratulations my readers, you are all hackers.

Now I get it. There are also bad hackers out there: The Black hats. The ones who are trying to get into our stuff. We need to stop them. Another day, another data breach, right? Billions of records lost costing tens of billions of dollars. Credit cards, City & School's finances, People’s personal info, and heck even elections all compromised.

What do we do to turn the tide of the cyberwar we are all in?

Yes, we are in a cyber war. The battlefield is all around us and like it or not, we’re all involved. Who here has been hacked, had their identity stolen or know someone who has? Ouch, huh? It affects us all. You can’t hide from cyber-crime. Complacency is the enemy of security.

No alt text provided for this image

We need to be building our cyber workforce where everyone is prepped for battle. This means developing warriors trained in hand-to-hand cyber combat; learning the tech skills of the online battlefield. We need to train everyone in protecting themselves from being a casualty. 

How do we do this, though? How do we build our cyber workforce?

The solution is contained in the problem: Understanding hackers, their mindset, how they work and what they do. It takes a hacker (the good kind) to stop a hacker (the bad kind).

To solve today’s cyber problems, we need to build the next generation of hackers; young and old.

I’ll dive into that in Part II: Developing Next-Gen Hackers

Dallas Haselhorst

GSE #231 | CISSP | SANS/GIAC(x10) | TreeTop Security founder | BSidesKC co-organizer | STEM Harvest founder | Entrepreneur | Disruptor

5 年

Thanks for sharing Ron!

要查看或添加评论,请登录

Ron Woerner的更多文章

  • Citing code – A Solution for DevSecOps?

    Citing code – A Solution for DevSecOps?

    ??Alexandra Andrews asked would security risk be decreased if all software developers used academic citations for code…

    46 条评论
  • Bomb-Proofing Your Online Meetings

    Bomb-Proofing Your Online Meetings

    With the convenience of online meetings comes a danger of leaking secrets, Internet trolls, and malware. Simple steps…

  • Cybersecurity Tips, Tools and Techniques - RSAC 2020

    Cybersecurity Tips, Tools and Techniques - RSAC 2020

    This blog is a quick preview of my RSAC 2020 talk that contains hundreds of apps, tools, resources and lists. There are…

    2 条评论
  • It's 2020 - Time to KISS-OT

    It's 2020 - Time to KISS-OT

    Today’s world is often quite complex. Security is often lost in the translation of advanced, persistent exploits…

  • Hackers Wanted - Part II

    Hackers Wanted - Part II

    This is Part II of a two-part series based on my TEDx talk, “Hackers Wanted.” (See Part I here) Part II: Next-Gen…

    1 条评论
  • Cybersecurity Careers: Hacking Your Next Job

    Cybersecurity Careers: Hacking Your Next Job

    Think and act like a hacker to land your perfect job I’m a hacker. I’ve been one all my life.

    7 条评论
  • Dissecting the Psychology of the Wily Insider

    Dissecting the Psychology of the Wily Insider

    On almost any given day you can find a news story about an employee who has gone bad and committed fraud or damaged an…

  • There's a Tool for That

    There's a Tool for That

    Many of the resources we need as cybersecurity professionals are out there. You just need to find them.

  • Use Risk Management to handle “Pet Risks”

    Use Risk Management to handle “Pet Risks”

    “7 out of 10 companies overspend on IT expenses without improving security or becoming compliant.” Computerworld What…

  • CompTIA Security+: The Gateway to Security Certifications

    CompTIA Security+: The Gateway to Security Certifications

    One of the greatest hindrances to mitigating cybercrime is the lack of qualified and skilled professionals trained in…

社区洞察

其他会员也浏览了