Presentations/Talks 2023: OWASP Triangle NC (Virtual): Building a Security Program & Preparing for a Breach 2022: BsidesNOVA: Preparing for a Breach in a SaaS Environment Year-Up AMA: Alumni Panels 2020: YU & LCPS High Schools: Cybersecurity Career Journey 2019: CyCon … Read More
Author Archives: Christian Galvan

What To Know About Cyber Warfare & Unspoken Ethics
Cyber Warfare & Unspoken Ethics Decisions Illustration: Pexel, Tima Miroshnichenko Written in 2017. Updated & Published on September 23rd, 2022. Abstract The concern for Internet Security has been relevant prior to the private institutions and the public domains having access to … Read More

How Jiu Jitsu Transformed My Life
How Jiu Jitsu Transformed My Life Illustration: Training at Shield BJJ in Leland, NC. Rash Guard Designed by Paower & Co What is the sport of Brazilian Jiu Jitsu? To most untrained individuals combat between two individuals is a chaotic … Read More

Essential Knowledge For Containing a Hack Pt. 1
Essential Knowledge For Containing a Hack Pt. 1 Illustration: Pexel, FreeStocks.org Incident Response Definitions: Trigger: Predefined threshold that can be configured on a technology or defined in policy for awareness Alert: The notification delivered by the trigger system that the … Read More

Rapidly Search and Hunt through Windows Event Logs
Rapidly Search and Hunt through Windows Event Logs Illustration: Pexel, Skitterphoto Incident Response Lifecycle: In the event that one of your endpoint protection software identifies malicious software on a laptop, this blog will provide steps that can ensure the spread … Read More

Easy Steps to Break Into Tech
Easy Steps to Break Into Tech Illustration: Pexel, Thisisengineering Earlier this week, I created an Instagram poll to determine how many of my roughly 1000 followers were in Tech Jobs so I can best understand my audience as I prepared … Read More

Level Up Your Career With A Leadership Model
Level Up Your Career With A Leadership Model Introduction A leadership model is a set of guidelines for how to lead that can be customized to your individual needs. Using this model will help you develop as a leader and … Read More

How Tech People are Outsmarting Their Pocket Spy SmartPhones
How Tech People Are Outsmarting Their Pocket Spy Smartphone Illustration: Virtual Location, Felix Baynham Introduction Here at The Duke of Cyber, we’re big fans of … Read More

How To Get Into Cybersecurity
How To Get Into Cybersecurity I get this question often from students, peers, and professionals who want to make a career change. Instead of sending a Google Doc which only a few people will see, I decided to make this … Read More

Leadership Reflection – Know Yourself
Leadership Reflection – Knowing Yourself Earlier this year I began a leadership journal during my Master’s Program at Brown University. Below is my reflection and analysis from personal experience combined with lessons learned from an article by Robert. J. … Read More