Judd Wybourn

Cybersecurity Consultant, Microsoft

The road to cybersecurity

Much like the adage "the road to hell is paved with good intentions," so too can be the journey of a budding cybersecurity professional. The ability to adapt to varying environments and circumstances is key to anyone who is seeking to go down the path of a cybersecurity professional. The biggest learning factor through my career path in the security profession is that security can normally be trumped by a business's need to perform! This is normally a big blow to any individual that has the passion to secure a business, only to be halted at the next meeting, project review, development discussion, or just plain corridor talk, for many varying factors.

When I started along my journey, there were many things I had to learn, and I had to double- and triple-check to make sure I was getting it right. This industry has changed from a no business to a let's make this work, however, securely business. Whether you are talking to technicians, architects, managers, directors, or even end users, none of these people will quite understand the passion behind your convictions to get a product or environment as secure as possible – that is, until disaster strikes or it is looming in the background.

Knowing the limits

My first bit of advice would be to know yourself, and to know your own limits. There are plenty of individuals in the cybersecurity industry, and I haven't met one who knows everything. This field is miles long and plenty deep, all depending on which path you choose. The many facets of the industry can be very rewarding if you know what you enjoy and what will keep you going. Puzzles, challenges, mystery, intrigue, and even romance, can all be expected in this field, a cliché never the less out of a novel or even a movie, yet all these things can be experienced in a moment or over a period of time.

Forensics, compliance, breaching, testing, analytics, or even design, are all pieces of a larger puzzle that encompass this vast subject called cybersecurity. The question that most people ask when they hear about what I do is "How can I get into that?" or "What should I study to do security?" Many a time, I have been left pondering the correct answer to give, only to think about my journey to this career path. This can be a discussion that goes on for minutes or hours as I sit and describe all the exciting options that cybersecurity has to try to guide you in the right direction. Sometimes, it's a simple question of, do you prefer to read or watch movies? And, out of the those, what is your favorite genre?

This is a general guideline of where you could see yourself within the field of cybersecurity. The following are some of the exciting roles and brief descriptions that can await you, just to name a few:

The listed roles provide a glimpse of the skills or mindset you might require to fulfill those roles. Bear in mind that these roles could be fluid and ever-changing, adapting to the times and the situation you are in. Remember what I said at the beginning of this chapter: have the ability to adapt. Keeping that in mind, the industry has a lot of certifications to help aspiring cybersecurity professionals. The problem, is which ones should you take and how will they help you? This is another question that is asked of most cyber professionals, and there can be many opinions on the matter. I also know of many individuals that are not certified in any of the well-known certifications, but are, however, still very knowledgeable in their areas of expertise.

I would suggest that, depending on your level of knowledge of the industry, number of years in the industry, years of study, and, of course, knowing your probability to fall into a certain role, that you investigate the known certifications houses and see what offerings they have from beginner to expert level. See which appeals to you or where you would like to focus your interest. Also, look to the job boards to see the role you are looking for and what the certification requirements are, if any. Some certifications have a practical requirement, which requires you to demonstrate the knowledge that you have learned in a simulated environment over a standard test. Where possible, practice building labs with friends or family that have the same interests and learn; you will be surprised at just how much you will know after you rebuild that lab for the tenth time due to an incorrect security setting, or a failed simulation.

In my case, I had already been in the Information Communications Technology (ICT) industry for 10 years before my interests led to cybersecurity. Although security was always something in the back of my mind, it became more imminent when threats where causing late-night work and presumed on-call work. Viruses such as the ILOVEYOU virus in 2000, which brought down email systems, or the Conficker worm in 2008 and Stuxnet in 2010, really tested the resolve of cybersecurity teams.

Its through scares such as these and the needs of the organization I was in at the time that drove me to look to names in the industry and follow principles. When tackling any identity-related security, I always looked at principles of least privilege as a starting point, and, subsequently, the segregation of duties. Having a military background really helps with this line of thinking; however, it does not always translate well into every organization. Saying that, it reiterates my previous statement that flexibility is key.

Frameworks really helped to build the ground roots of my understanding, and each one can be quite different. When starting out, I shot straight for the US National Institute of Standards and Technology (NIST), and this gave me a broad depth of knowledge that led me to find out about more frameworks to use, which were industry-specific. This included the likes of PCI DSS for all payment card handling, HIPPA for US health care and information handling, and PIPA for the handling of personal information in South Africa. Much like the foundation of a house, a framework can provide you with some of that foundation. However, these are just foundations; certain aspects can differ for various reasons.

The next step is to look to big names in the industry. Bruce Schneier was one of the first that I found that was useful, especially around the topics of cryptography. Then, many others will come to light and you will soon see whose style of writing and insights you enjoy. Try to follow these people on social media and visit their blogs and websites if you have that information. That said, the internet is full of information and helpful sites. Sign up to some threads around your topics of interest to see what's happening around the world. But, beware—you can soon find yourself inundated with information and not know what to read. Stick to reputable sources and keep it relevant to your needs.

Knowing your threat helps you to better focus on what would be required to protect the system. So, in those terms, when I was tasked with looking after certain bits of the business, I would focus all my attention on the means of delivering that software, the hardware it was on, and the methods of accessing it. To better understand the vectors of attacks, I learned to think like an attacker and went and learned about hacking. I achieved a Certified Ethical Hacking (EC-Council, 2019) certificate, and that was my first cybersecurity certification. My next goal was to achieve my CISSP (ISC2, 2019), as this was seen as the flagship certification to have in the industry. This was great to achieve at the time, as I had already had a lot of experience to my name. I also completed my masters degree in computer security just to enhance my educational background. The quest for learning in this field is always vast, and never dull. There is always something to find, even if it means you find out that it's a subject you don't like.

I have used my skills in different organizations and in different roles, each very different and fulfilling. I'm constantly learning and still, to this day, have a passion for the cybersecurity field. I always have a drive to protect the innocent from the dark side of the internet, as many, many people can be naive. Where possible, I like to make my knowledge available to those people, to help them understand the role of cybersecurity. I like talking to parents so that they can protect their children. The World Wide Web is just like the real world and has scary places to visit, and I always like to say that it has made the oldest crimes available in the newest ways; that is, you can rob a bank from the other side of the world without leaving the comfort of an armchair.

In closing, if asked would I do this again, my answer would yes be a thousand times over, as I love it very much. It is a great profession to be in and will be needed as long as the world progresses to move forward, where information will be valuable to someone at some time.

Who is Judd Wybourn?

Judd is a cybersecurity professional with over 20 years' experience in the ICT industry. He has a master's in computer security and various industry certifications. He currently works at Microsoft as a Cybersecurity Consultant, delivering solutions to customers. Judd has a big passion for protecting children on the internet and when he has the opportunity, he speaks about it to children, parents, and professionals alike.