Blog   .
September 22, 2024

Where do I start? Cybersecurity by Stephen

Unfortunately, I don’t have space to take on more mentorship spots right now. And I don’t want to leave you with nothing. Look at the content below and pick a place to start.  

Before you start in cyber, take a personality assessment. Just do it. It will help far more than you probably realize right now. Seriously. Here's a good one: 16 Personalities

If you’re not currently in the cyber security industry, start here. This will help you figure out where to start and which direction to go: https://www.linkedin.com/pulse/why-youll-fail-cyber-security-stephen-semmelroth-/

Know your adversary. Read Sandworm: https://www.amazon.com/Sandworm-Cyberwar-Kremlins-Dangerous-Hackers/dp/0385544405

If you’re getting out of the military, start here: https://www.linkedin.com/pulse/military-transition-cyber-focus-stephen-semmelroth-/

Cybersecurity Career Master Plan by my friends Dr. Auger, Jax, Jon Helmus, and Kim Nguyen. Read the book to help select your career:  https://www.amazon.com/Cybersecurity-Career-Master-Plan-cybersecurity-dp-1801073562/dp/1801073562/

If you want an overview of the industry and the top technical frameworks to look at, start here: https://www.linkedin.com/pulse/how-learn-cyber-over-weekend-orientation-48-hours-semmelroth-/

If you have a question about cyber certs, go here: https://www.linkedin.com/pulse/how-pick-your-firstnext-cyber-certification-stephen-semmelroth-/

If you want to learn how to do technical malware analysis, start here: https://www.linkedin.com/pulse/how-build-exploits-reverse-engineer-semmelroth-mba-meng-cissp/

If you want to learn how the bad guys are attacking you personally, go here: https://www.linkedin.com/pulse/shame-security-stephen-semmelroth-/

Don’t just have an incident response plan, REHEARSE it (and learn from Equifax) - https://www.linkedin.com/pulse/learning-from-equifax-why-businesses-must-rehearse-plans-semmelroth/

CISO tools - Open-source cybersecurity policy templates that we open-sourced so you don’t have to build them yourself - https://github.com/ericiussecurity/ProjectKeystone (originally published open-source at StrataCore)

CISO tools - Open-source vCISO tools. The five phases of a security program build (roadmap) - https://github.com/ericiussecurity/vCISO-Tools

CISO tools – Carlota Sage has the industry standard roadmap and financial analysis tools. Use them. Give her feedback. She’s awesome - https://github.com/carlota/showmethemoney

People to follow (unordered)

👉🏼
🥓
🔥
🔥
🔐
💻
🔥
🤘
🌊
☁️
🎯

Twitter to follow (unordered):

  • @MalwareHunterTeam
  • @malwarejake
  • @tinkersec
  • @MalwareUnicorn
  • @haveibeenpwned
  • @diodepack (blatant self-promotion)
  • @brysonbort

News sources to watch:

Resume help:

  1. VetSec (Slack) - Veteran Security Group - Vets only
  2. Katia Dean - paid, this is not an endorsement
  3. Richard Drosin - paid, this is not an endorsement

Cover photo by Michael Dziedzic - @lazycreekimages

Editors Note:  This article is shamelessly stolen (with permission) in its entirety from Stephen Semmelroth’s original article posted HERE.  Stephen Semmelroth is an amazingly positive voice in the cyber community.  I once attended a conference with him where he sat down for 2 hours red-inking resumes for free to help people looking for new jobs.  He mentors transitioning veterans as well as people looking to transition into the cyber field.  You should connect with him on LinkedIn HERE.

Stephen Semmelroth