• Your Cyber Path: How to Get Your Dream Cybersecurity Job

  • By: Kip Boyle
  • Podcast
Your Cyber Path: How to Get Your Dream Cybersecurity Job  By  cover art

Your Cyber Path: How to Get Your Dream Cybersecurity Job

By: Kip Boyle
  • Summary

  • Find out what it takes to get your dream cybersecurity job (from the hiring managers' perspective).

    Kip Boyle
    Show more Show less
Episodes
  • EP 116 - What's next after season 2?
    Feb 16 2024

    What's next after season 2?

    About this Episode

    In the grand wrap-up of season two of the podcast 'Your Cyber Path', hosts Kip Boyle and Jason Dion reflect on their four-year podcast journey. They also reveal that for the time being, there won't be a season three as originally planned.

    Several factors have influenced this decision, the primary being their venture Akylade – a cybersecurity certification organization. They're also experiencing increased demand for their time and energy due to factors involving Akylade and other projects. However, they highlight the intention of potentially doing a third season in the future based on the feedback and demand received.

    Kip Boyle will continue to mentor notes but change the frequency from weekly to monthly. Jason Dion urges listeners to check their cybersecurity course, 'Irresistible' on Udemy.

    They greatly encourage listeners to stay in touch and seek guidance on cybersecurity careers through email which is available at yourcyberpath.com.

    Relevant websites for this episode

    https://cr-map.com

    https://www.akylade.com

    https://www.yourcyberpath.com

    https://www.diontraining.com/udemy

    Show more Show less
    37 mins
  • EP 115 - SDP 10: Separation of Privileges
    Feb 6 2024

    SDP 10: Separation of Privileges

    About this Episode

    In this episode of the Your CyberPath podcast, Kip Boyle and Jason Dion delve into the concept of the separation of privilege as a vital component of their series on security architecture and design principles.

    Jason and Kip talk about how the separation of privilege illustrates its significance through real-world examples. They also help showcase its application in technologies, military operations, and financial transactions.

    Jason also draws from his military experience to underscore the critical role of separation of privilege in SOVOT (System Operations Verification and Testing) environments.

    Finally, they underscore its importance in password management systems. They emphasize its pivotal role in upholding cybersecurity standards. Understanding these principles is essential for building robust security frameworks.

    Relevant websites for this episode

    The NIST Separation of Duty (SOD) - https://csrc.nist.gov/glossary/term/separation_of_duty

    Other relevant Episodes

    EP 94: Ten Security Design Principles (SDP)

    EP 96: SDP 1: Least Privilege

    EP 98: Security Design Principles 2: Psychological Acceptability

    EP 101: SDP 3: Economy of Mechanism

    EP 103: SDP 4 Compromise Recording

    EP 105: SDP 5: Work Factor

    EP 107: SDP 6: Failsafe Defaults

    EP 109: SDP 7: Complete Mediation

    EP 111: SDP 8 open Design

    EP 113: SDP 9 — Least Common Mechanism

    Show more Show less
    16 mins
  • EP 114 - NIST CSF Versus The Top 18
    Jan 19 2024

    About this episode

    In this episode, Kip Boyle and Jason Dion discuss the importance of cybersecurity in the current digital landscape and focus on comparing two different standards: The NIST Cybersecurity Framework and the CIS Top 18.

    The NIST Framework was created to assist organizations in becoming cyber resilient and offers an adaptable and comprehensive approach to cyber risks. The CIS Top 18, on the other hand, provides an actionable and practical checklist of controls that is prioritized and sequenced.

    Both of these frameworks provide us with cybersecurity measures that can be used for different applications. They can be used individually, or they can work together by complementing each other in a comprehensive cybersecurity strategy.

    It is important to realize that the CIS Top 18 can end up being quite expensive for smaller organizations to operate, though, which is why many people are choosing the NIST CSF instead. You should always consider various factors, such as organizational size and specific needs, the type of threats faced, and the budget available for implementation when selecting the framework for your organization.

    Relevant websites for this episode

    The NIST Cyber Security Framework (CSF) - https://www.nist.gov/cyberframework

    The 18 CIS Critical Security Controls - https://www.cisecurity.org/controls/cis-controls-list


    Other Relevant Episodes

    EP 62 – The NIST Cybersecurity Framework

    EP 79 – Mid-Career Transition Success Story with Steve McMichael

    EP 83 – Automating NIST Risk Management Frameowrk with Rebecca Onuskanich

    Show more Show less
    50 mins

What listeners say about Your Cyber Path: How to Get Your Dream Cybersecurity Job

Average customer ratings

Reviews - Please select the tabs below to change the source of reviews.