Tribe of Hackers Security Leaders by Marcus J. Carey & Jennifer Jin
Author:Marcus J. Carey & Jennifer Jin [Carey, Marcus J. & Jennifer Jin]
Language: eng
Format: epub
ISBN: 9781119643760
Publisher: Wiley
Published: 2020-03-09T16:00:00+00:00
What's the most important decision you've made or action you've taken related to a business risk?
I love this question. Recently I gave a speech at the final DerbyCon about what I learned from risk as a business owner. I talked about what I learned from the risk I took by starting a social engineering–only company when no one else on Earth was doing that. I talked about the risk of focusing on trying to leave everyone I met better for having met me, even though I am hacking them. But on top of it all, I would say the biggest risk I have taken in my career is to hire people who are new to the field and pour my heart and soul into teaching them everything I know and everything I am.
I chose this path because I felt it was the best way to get people to help me make my company and this industry amazing. For the largest majority, it paid off; I have a team of some of the most amazing people on Earth. I really do. But there have been times that it backfired on me, and people have left the company—even stolen the things I taught them to try to compete or turned a deaf ear to our mantra.
With that said, I would not change much about what I did with that risk, because the end result is to have some of the best people I have ever met at my side, making this company and industry a better place to be.
How do you make hard decisions? Do you find yourself more often making people, process, or technology decisions?
Social-Engineer, LLC, my company, is focused on the people side of security. So, more often than not I am making decisions about people and processes—people I hire and work with, as well as the best way to train, educate, and work with people to make them more secure.
It is much like dieting and working out, which I need to do more of: there is so much benefit, but the changes are slow at first. Sometimes that slowness can make all of us impatient, and then we want to take the easy route.
So, I find myself trying new methods, trying new processes, and trying new ways of testing, training, and auditing the human side until I find one that works.
What's something that you struggle with as a leader, and how do you overcome that?
The “should” statement. That is my biggest struggle as a leader. I work hard to make sure my small company can provide the best environment for people. As a small company we have great salaries, full health benefits, dental, eye, life, 401K, unlimited PTO, and paid holidays as well as annual bonuses and raises as the company remains profitable. All of that has made me at times say, “Well, I offer all of these amazing things to people, so they should be loyal to me.” Or I found myself saying, “Because I gave this person
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Cryptography | Encryption |
Hacking | Network Security |
Privacy & Online Safety | Security Certifications |
Viruses |
Effective Threat Investigation for SOC Analysts by Yahia Mostafa;(5852)
Practical Memory Forensics by Svetlana Ostrovskaya & Oleg Skulkin(5544)
Machine Learning Security Principles by John Paul Mueller(5521)
Attacking and Exploiting Modern Web Applications by Simone Onofri & Donato Onofri(5193)
Operationalizing Threat Intelligence by Kyle Wilhoit & Joseph Opacki(5181)
Solidity Programming Essentials by Ritesh Modi(3635)
Microsoft 365 Security, Compliance, and Identity Administration by Peter Rising(3270)
Mastering Python for Networking and Security by José Manuel Ortega(3232)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3227)
Future Crimes by Marc Goodman(3221)
Blockchain Basics by Daniel Drescher(3189)
Operationalizing Threat Intelligence by Joseph Opacki Kyle Wilhoit(2983)
Mobile App Reverse Engineering by Abhinav Mishra(2786)
Learn Computer Forensics - Second Edition by William Oettinger(2780)
Mastering Bitcoin: Programming the Open Blockchain by Andreas M. Antonopoulos(2747)
From CIA to APT: An Introduction to Cyber Security by Edward G. Amoroso & Matthew E. Amoroso(2680)
The Code Book by Simon Singh(2613)
The Art Of Deception by Kevin Mitnick(2504)
Incident Response with Threat Intelligence by Roberto Martínez(2477)
