How to Turn Your Hacking Skills Into a Career

Presented at HOPE 2020 Virtual Rescheduled, July 30, 2020, 11 a.m. (60 minutes)

As hackers, we all have unique skills and abilities that are in huge demand globally. But cybersecurity can be a tough industry to break into, and the acronym soup of qualifications and certifications can make it difficult to work out how to get started.

Orson, Naz, and Tom will present a discussion panel on how to build a successful career in cybersecurity from a background in hacking. All three have very different, diverse backgrounds, and very different skill sets - yet have managed to bypass university degrees and build their own unique careers in the industry.

Anyone who wants to break into the industry, who wants to further their career, or just wants to understand how to use their passion to pay the bills will benefit from attending this panel. Tom is now a CISO, published author, and consulting director. Orson and Naz have taken very different routes in their careers, but are now highly regarded security researchers at an award winning cybersecurity consultancy in the U.K., presenting their research to industry leaders and executives.

There isn't a shortage of cybersecurity skills in this industry - there's a shortage of people with the right attitudes and motivations. This panel will share their experiences - both good and bad, as well as the personal issues they each overcame - and encourage and enable others from equally diverse backgrounds to build their own unique careers in the industry.


Presenters:

  • Orson Mosley
    **Orson Mosley** is a cybersecurity researcher specializing in low level software reverse engineering. His love of reverse engineering started at 17 with an interest in hacking video games. Over the next few years, he delved into understanding CPU architecture and reverse engineering custom data and compression formats from old school JRPGs. During his first years of employment, he engaged in a wide range of activities, including conducting infrastructure and web application penetration testing in both physical and cloud environments, as well as producing technical configuration documentation. He's also a hands-on security engineer with a broad spectrum of both physical and virtual security appliances which include firewalls, routers, Linux/Windows, scanners, and SIEM/TVM products. Recently he's delved back into computer architecture and low level system functionality through learning to write 90s DOS and modern Windows malware.<br>
  • Tom Kranz
    **Tom Kranz** is a director and cybersecurity consultant who helps organizations to understand and address cybersecurity threats and issues. Tom's career started over 30 years ago, armed with a BBC Micro and illicit access to Prestel (and other U.K. systems). After a successful consulting career helping U.K. government departments and private sector clients (including Betfair, Accenture, Sainsburys, Fidelity International, and Toyota), he now advises and supports organizations across Europe on their cybersecurity strategy and challenges. Tom lives with his partner in Italy, where they rehabilitate their collection of rescue dogs and cats, as well as managing their many opinionated ducks.<br>
  • Naz Markuta
    **Naz Markuta** is a cybersecurity researcher, focusing on web applications, vulnerability research, and mobile telecoms. Active in multiple public and private bug bounty programs, his current research projects include: building a LTE IMSI catcher, spoofing public emergency alert messages, 5G mobile network and infrastructure, and product and software security testing.<br>

Links:

Similar Presentations: