Put Me In Coach: How We Got Started In Infosec

Presented at DerbyCon 3.0 All in the Family (2013), Sept. 28, 2013, noon (50 minutes)

So, you’re interested in Infosec and curious where to begin… Come listen to four Infosec professionals tell their tales of n00b to now. This panel will discuss the very different backgrounds that have brought each of us to the place we are now. We will provide some hints and general advise for getting your start in Infosec.


Presenters:

  • David Kennedy / ReL1K as Dave “ReL1K” Kennedy
    Dave “ReL1K” Kennedy is founder and principal security consultant of TrustedSec – An information security consulting firm located in Cleveland Ohio. David was the former Chief Security Officer (CSO) for a Fortune 1000 where he ran the entire information security program. Kennedy is a co-author of the book “Metasploit: The Penetration Testers Guide,” the creator of the Social-Engineer Toolkit (SET), and the creator of Artillery. Kennedy has presented on a number of occasions at Black Hat, Defcon, ShmooCon, BSIDES, Infosec World, Notacon, AIDE, ISACA, ISSA, Infragard, Infosec Summit, and a number of other security-related conferences. Kennedy has been interviewed by several news organizations including CNN, Fox News, and BBC World News. Kennedy is on the Back|Track and Exploit-DB development team and co-host of the Social-Engineer.org podcast and regular on ISDPodcast. Kennedy is one of the co-authors of the Penetration Testing Execution Standard (PTES); a framework designed to fix the penetration testing industry. Kennedy is the co-founder of DerbyCon, a large-scale conference in Louisville Kentucky. Prior to Diebold, Kennedy was a VP of Consulting and Partner of a mid-size information security consulting company running the security consulting practice. Prior to the private sector, Kennedy worked for the three letter agencies and deployed to Iraq twice for intelligence related missions.
  • Frank Hackett
    Frank Hackett plays both sides of the ball. He’s a Security Consultant and doubles as a Senior Systems Engineer. Over the past two years, Hackett has worked under j0e McCray and holds the roll of “Senior r00kie.” While under j0e’s tutelage, Hackett has worked on many high security pentests and developed coursework for security training. Recently, Hackett has worked within his place of employment to launch a new security company offering pentests and vulnerability assessments. If not for the influence of his father, Hackett would not be the computer based professional he is today. Late night games of DOS based Monopoly and “Guess the Password” laid the groundwork for his love of technology and passion for working with computers. Hackett continues his father’s legacy of tinkering by learning something, breaking something, and then making something better each and every day.
  • Chris “g11tch” Hodges
    Chris “g11tch” Hodges is a US Army solider by day, TrustedSec consultant by night. g11tch is a professionally ranked chainsaw juggler and exploit developer wannabe.
  • pr1me
    pr1me works at a college as a janitor even though he feel like he’s smarter than most of the people who go there. Sometimes pr1me sees an equation written on a blackboard, like half an equation and… he just figures it out. pr1me is a hacker, social engineer, python fanboy and retired troll extraordinaire. pr1me has been in the scene (when the scene was alive) since ’92. pr1me is the founder of High Hack Society and also a developer on the Social Engineer Toolkit. pr1me is guilty of taking various dissociative drugs, looping Oribital’s “Halcyon On and On” and coding for 36-48 hours at a time. pr1me enjoys hoarding rootshells, disrupting 0day sales, coding binges and long walks on the beach.

Similar Presentations: