From Network Admin to Cybersecurity Consultant: My Journey & Hard-Won Insights

Coffee number three just kicked in—I’m feeling nostalgic. Before running my own cyber security company, I began as a network admin in 1993. Picture this: dial-up tones, clunky hardware, and managing network & muxes over a Public Switched Telephone Network (PSTN). Fast forward to today, and I’ve just returned from DefCon, buzzing with excitement from the hardware hacking village. Let’s dive into some lessons learned over these years.

Quick Take

A Journey Through Time: Networking in the ’90s

Let’s set the scene. It’s 1993, and the world of networking is both a tangled web and a new frontier. The dial-up buzz was the soundtrack of my early years. Handling the mux for voice and data over PSTN was like playing Tetris with live grenades.

In those days, network admins had to be the jack-of-all-trades—your world’s supply of Swiss Army Knives. These foundational experiences prepared me for what was coming: The Slammer Worm.

Facing the Slammer Worm Head-On

The Slammer worm was digital pandemonium at its finest. It spread so fast, I remember just staring blankly at my monitor thinking, “Is this really happening?” Maybe you had the same experience?

Here’s the thing (stick with me). The Slammer worm taught us network segmentation isn’t a luxury—it’s an absolute necessity. We need to compartmentalize our systems like a well-organized kitchen (because who wants their kitchen knives in the cookie jar?).

Lessons from Slammer:

An Era of Zero-Trust: Beware the Buzzwords

I’ve been neck-deep in zero-trust architecture recently—especially while upgrading security systems for three banks. It’s an eye-opening experience: everything from firewalls, servers, to routers needs to be vigilant.

A zero-trust model changes how identity, access, and verification work. But let’s be clear, it’s not a one-size-fits-all solution—more like cooking, there’s no substitute for real ingredients.

Incorporating Zero-Trust:

DefCon Debrief: Adventures in the Hardware Hacking Village

I confess—seeing new hacks and defenses at DefCon were enough to make any budding cybersecurity enthusiast giddy. The hardware hacking village? It’s where dreams and nightmares coexist. There’s nothing quite like watching a seasoned pro take apart a device.

And here’s one more nugget: Red teaming. It’s not as ominous as it sounds. Think of it as a thrilling car chase—where you willingly hand over your keys just to see how good your security drivers really are.

A Few Soapbox Rants: Password Policies & AI Skepticism

Are complex password policies making us safer? In my opinion—no. They’re the cyber equivalent of asking folks to memorize the entire periodic table. We need memorable, yet strong credentials.

Now, can we talk about AI? Fear not, I’m not a purist naysayer. AI in cybersecurity does have its place. But we must recognize that it’s a tool—not the tool. Data only becomes reliable through human oversight. Because remember, tech without the human touch is just like raw data. Unprocessed and prone to errors.

Simplified Tips for Struggling Users

Final Thoughts: Balance and Preparation

Looking back, the evolution from network admin to cybersecurity consultant has been surreal. And this journey requires remembering both the past (good ol’ PSTN) and looking to future horizons. Stay prepared, adapt, and never stop learning. That’s the roadmap to a cyber-secure operation.

Cheers, from a slightly caffeinated, just-back-from-DefCon consultant at the helm of his own security firm. Keep safe out there!

Exit mobile version