Cyber Builders Checkpoint: Reflect, Review, and Revamp! 🎯
Tell Us How We're Doing and What You Want to See Next
Questionnaire
Hello 👋
We are at the end of 2023 Q2. So I want to take a break this week as today’s newsletter marks the first three months of Cyber Builders. I want to hear back from you. I want to know how you feel about Cyber Builders and hope you can give me brutally honest feedback.
Moreover, as many of you joined since the first posts, it’s time to reflect. So in this post, I will provide you with one sentence of all the 2023 Q2 articles I created grouped by themes.
But first of all, please take the time to fill out the 5 mins questionnaire!!
Let Your Voice Be Heard 📝
Since I started Cyber Builders, all the motivation boosts came from getting feedback from readers. Cybersecurity practitioners at enterprises who want to know more about a concept I covered. Entrepreneurs who are willing to scale their company. Newbies who are interested to learn more about the latest trends. AI passionate who wants to know how to secure these new and fancy AI models. In general, professionals want actionable pieces of advice. This is my focus.
Vinay Narayan gave the latest and greatest of June on Substack Chat.
Challenge accepted. Be sure that I’ll have a post on SMB in Q3 2023.
Connecting with Cyber Builders' Community: Share Your Thoughts! 🔄
Please open up the form and fill it out! I made it anonymous, and questions are not mandatory; if you don’t like one, you can skip it (except the first one about how you feel about Cyber Builders). No personal data are collected.
What you find there is pretty straightforward. ⬇️
➡️ The questions in the questionnaire use the Likert scale. This rating scale is commonly used to measure attitudes or perceptions. It typically consists of a series of statements the respondent is asked to rate on a scale of agreement or disagreement. In this case, the scale ranges from 0 to 10 and asks how likely the respondent would recommend Cyber Builders to their peers in cybersecurity and which cybersecurity topics they are most interested in.
➡️ I'm interested in knowing if you build cybersecurity products, deliver cybersecurity services, lead cybersecurity in your company as a CISO/Security Leader, or have a strong interest in cybersecurity but are not yet working there. Please click on the option that best defines you. Additionally, if you have anything else you'd like to share about yourself or your experience with Cyber Builders, feel free to use the field provided to share your thoughts.
➡️ Moreover, I have several topics in my Cyber Builders pipeline where I would write several posts. The survey is a way to prioritize topics:
Artificial Intelligence (AI) is revolutionizing the field of Security. AI can detect and respond to threats in real-time, predict attacks before they happen, and identify vulnerabilities in systems that malicious actors could exploit. In addition, AI can help improve the efficiency of security operations, reducing the workload on human operators and enabling faster response times. With the increasing sophistication of cyber attacks, AI in Security is becoming more critical than ever before. As technology continues to advance and new threats emerge, it is clear that AI will play a crucial role in keeping our data and systems safe.
One area that is becoming increasingly important in today's world is the development of cyber products, services, and teams. To succeed in this field, it is essential to have a deep understanding of the latest trends and technologies and the ability to work collaboratively with others to bring new ideas to life.
Cyber product development is an exciting and rapidly evolving area that offers many opportunities for growth and innovation. Whether you are interested in product management, go-to-market strategies, engineering, or any other aspect of this field, there is no doubt that there is a bright future ahead for those willing to put in the time and effort to succeed.
Product security engineering is a crucial aspect of software product development. This field involves identifying and mitigating potential security risks and ensuring that the product meets industry standards for security and privacy. To achieve this, product security engineers may work closely with developers, quality assurance teams, and other stakeholders to identify potential vulnerabilities and implement adequate security measures. This may include conducting thorough security audits, implementing secure coding practices, and developing secure communication protocols. This may also imply running bug bounties and managing vulnerability disclosures.
Starting a cybersecurity program for your small to mid-sized business can be daunting. However, it is essential to remember that cyber threats are becoming increasingly prevalent, and taking proactive measures to protect your company's sensitive information should be a top priority.
A cybersecurity program for your small to mid-sized business is overwhelming. Still, there are best practices that can be implemented without too much effort that will significantly increase the SMB level of protection and cyber attack readiness.
➡️ Finally, I want to hear you on “What are some of the security trends that you find most interesting?“
Resilience - When it comes to resilience, it is essential to understand how systems can continue functioning even when under attack. This requires a multi-layered approach that includes risk management, threat intelligence, and incident response.
Open-source intelligence (OSINT) uses publicly available information to gather intelligence on potential security threats. With the vast amount of data available on the internet, OSINT has become increasingly relevant in identifying and mitigating security risks.
The Internet of Things (IoT) has become ubiquitous in modern life, from smart homes to connected cars. However, with this increased connectivity comes an increased threat surface, making IoT security a key concern.
Shift left, and developer tools refer to integrating security into the software development life cycle (SDLC) from the beginning. By doing so, security issues can be identified and addressed early on, reducing the risk of vulnerabilities being introduced into the final product.
Zero trust is a security model that assumes all users, devices, and applications are untrusted until proven otherwise. This approach requires strict access controls and continuous monitoring to ensure that only authorized users and devices can access sensitive data.
Cloud security has become increasingly important as more and more organizations move their data and applications to the cloud. This requires a comprehensive security strategy that includes access controls, data encryption, and threat detection.
Data security is essential in today's digital age, with sensitive data being stored and transmitted across various devices and networks. This requires a multi-layered approach to security, including encryption, access controls, and continuous monitoring.
Finally, human in the loop refers to people's role in ensuring systems and data security. This includes educating employees on security best practices, monitoring suspicious activity, and providing security policies and procedures are always followed.
Cyber Builders' Q2 Recap 🌟
Here are all the Q2 2023 posts
AI and Security
AI Pass Hacker Test - GPT-4's Remarkable Performance in CEH Exam. How is AI taking over the world of penetration testing?
🔗 Link: https://cyberbuilders.substack.com/p/gpt-4s-remarkable-performance-in
AI Security Engineering Is Needed, Not Emotions. Discovering the Role of Security Engineering in Addressing Emerging Challenges within Artificial Intelligence
🔗 Link: https://cyberbuilders.substack.com/p/ai-security-engineering-is-needed
Product Building and Entrepreneurship
2023 Q1 - State of the VC market for Cybersecurity. If you are planning to raise money, read this first!
🔗 Link: https://cyberbuilders.substack.com/p/riding-the-cybersecurity-investment
The Six Pillars of Cybersecurity Platforms - Understanding how cybersecurity platforms can create value and might solve issues at SOCs
🔗 Link: https://cyberbuilders.substack.com/p/the-six-pillars-of-cybersecurity-platforms
Unlocking the Secrets of Cybersecurity Product Teams 🔓 Creating a future-proof cybersecurity product requires a great team! Discover the roles, strategy, and mindset required.
🔗 Link: https://cyberbuilders.substack.com/p/unlocking-the-secrets-of-cybersecurity
Cyber Builders Unite! 🚀 Unlocking the Potential in Cybersecurity Entrepreneurship. 4 Steps to Identify Opportunities and Transforming Ideas into Success Stories as a Cyber Builder
🔗 Link: https://cyberbuilders.substack.com/p/cyber-builders-unite-unlocking-the
General Trends
◾️Resilience is the new black. How resilience is transforming the cybersecurity landscape and why you should care.
🔗 Link: https://cyberbuilders.substack.com/p/resilience-is-the-new-black
Why building cybersecurity solutions remains critical. My first post of the substack
🔗 Link: https://cyberbuilders.substack.com/p/why-building-cybersecurity-solutions
RSA 2023 - Platforms, AI, and 400 vendors! My takeaways from RSA and some stats about the event from a European cyber builder perspective. I had two posts on RSAC2023.
🔗 Link: https://cyberbuilders.substack.com/p/rsac2023-wrap-up-unraveling-the-convergence
🔗 Link: https://cyberbuilders.substack.com/p/rsac-2023-a-cybersecurity-enthusiasts
FIC 2023. I also attended a significant event in the north of France. Check out my views.
🔗 Link: https://cyberbuilders.substack.com/p/fic-2023-insights-and-takeaways-from
If it’s your Cyber Builders edition you’re reading, you are probably not yet one of our subscribers.
If you are, please spread the word.
Talk to you next week 💙
Laurent