No one is omniscient. We all have gaps we want to patch. How do the seasoned (and unseasoned? 😉 veterans handle knowledge gaps? Do you go over CBK topics. Read NIST Special Pubs till your eyes bleed? Meet young'uns for coffee (if under 21)?
There is a heckuva lot to know, especially as we "mature".
So what (generally speaking) are Infosec Achilles' heel(s) for which to be on guard?
Thanks, as always, for your considered opinions.
Read, read, read and read some more. I love to read. My GF is an attorney and RN, she claims she has never known anyone who loves to read as much as I do.
Books, industry magazines, & the web.
https://onlinedegrees.sandiego.edu/top-cyber-security-blogs-websites/
This is more than most can digest
Podcasts along with reading. Start each morning with several news websites, even ones you may not like, and scour them for InfoSec/Cyber stories. You will want to be able to appear to be "in the know" if your executives ask you about a story they saw on a website. Read cyber websites. Listen to podcasts. Attend free webinars.
Here is an ISC2 Community post that lists podcasts we have compiled.
https://community.isc2.org/t5/Industry-News/Security-Podcasts/td-p/2567/page/4
The Achilles' heel is not knowing about recent topics. I once attended a presentation where the guy giving the presentation was talking about the Stuxnet "virus" to a room of seasoned cyber professionals. It became painfully obvious that he didn't know what he was talking about and had not done in-depth research on it. He kept calling it a virus and played it off as a trivial thing. People actually started walking out of his presentation. He was trying to stay relevant by bringing up a recent topic but had not done enough in-depth research to come off as knowledgeable. You want to be able to have some idea what an executive or even a co-worker is talking about and if it has made it to the "mainstream media", you will want to be able to speak about it, or at least admit when you don't know but will do more research on it.
@j_M007 wrote:No one is omniscient. We all have gaps we want to patch. How do the seasoned (and unseasoned? 😉 veterans handle knowledge gaps? Do you go over CBK topics. Read NIST Special Pubs till your eyes bleed? Meet young'uns for coffee (if under 21)?
There is a heckuva lot to know, especially as we "mature".
So what (generally speaking) are Infosec Achilles' heel(s) for which to be on guard?
Thanks, as always, for your considered opinions.
I follow @rslade on the (ISC)^2 Community. 😉
Seriously: Rob, thanks for aggregating interesting articles from around the web!
What I do is acknowledge my weaknesses and seek out others who will balance it as their strength. I am often looked upon by my coworkers as if I am omniscient, but it is the strength of my relationships and willingness of my professional network to share knowledge and insight that helps me achieve.
Sincerely,
Eric B.
Excellently Socratic, Eric. It reminds me of a saying i saw on someone's IM status...
"The more you know, the more you know, how little you know." 😉
Agree here. For many years now I have been saying that InfoSec changes every hour so its nigh impossible to keep up but being a voracious reader certainly helps.
Remember back in the day when you could read Byte and Computerworld in paper and feel completely on top of the industry? Well those days have well past us any number of RSS/atom/Feedly/etc. feeds and products in general.
High pressure fire hose, today, thanks!
- beads
@Baechle wrote:I follow @rslade on the (ISC)^2 Community. 😉
Seriously: Rob, thanks for aggregating interesting articles from around the web!
Garsh, shucks [blush] [kicks dirt with toe of shoe]
As I have mentioned elsewhere, the RISKS-Forum Digest is definitely one of the great sources of keeping up to date with current dangers, and getting great pointers to detailed analysis as well.
Your US federal tax dollars at work used to bring us the DHS Daily Open Source Infrastructure Report. Except that, as of January of 2017 (gee, I wonder what happened then?) it doesn't.
But what you lot in the Unexplored Southern Area failed at, the humble Province of BC has done. You can either look up the Security News Digest on the archive, or send email to OCIOSecurity@gov.bc.ca asking them if they will put you on the mailing list.
Now this type of information is priceless, folks. I very much appreciate it.
I have made it a habit to pass on whatever tidbits (links, news, etc.) to my peers ,and we also have an in house weekly newsletter that I find a sobering (and sometimes gobsmacking!) read.
Your tips and suggestions are very helpful. Please keep the comments and suggestions coming.