Presentations/Talks 2023: OWASP Triangle NC (Virtual): Building a Security Program & Preparing for a Breach 2022: BsidesNOVA: Preparing for a Breach in a SaaS Environment Year-Up AMA: Alumni Panels 2020: YU & LCPS High Schools: Cybersecurity Career Journey 2019: CyCon … Read More
cybersecurity

What To Know About Cyber Warfare & Unspoken Ethics
Cyber Warfare & Unspoken Ethics Decisions Illustration: Pexel, Tima Miroshnichenko Written in 2017. Updated & Published on September 23rd, 2022. Abstract The concern for Internet Security has been relevant prior to the private institutions and the public domains having access to … Read More

Easy Steps to Break Into Tech
Easy Steps to Break Into Tech Illustration: Pexel, Thisisengineering Earlier this week, I created an Instagram poll to determine how many of my roughly 1000 followers were in Tech Jobs so I can best understand my audience as I prepared … Read More

Essential Knowledge For Containing a Hack Pt. 1
Essential Knowledge For Containing a Hack Pt. 1 Illustration: Pexel, FreeStocks.org Incident Response Definitions: Trigger: Predefined threshold that can be configured on a technology or defined in policy for awareness Alert: The notification delivered by the trigger system that the … Read More

Rapidly Search and Hunt through Windows Event Logs
Rapidly Search and Hunt through Windows Event Logs Illustration: Pexel, Skitterphoto Incident Response Lifecycle: In the event that one of your endpoint protection software identifies malicious software on a laptop, this blog will provide steps that can ensure the spread … Read More

How Tech People are Outsmarting Their Pocket Spy SmartPhones
How Tech People Are Outsmarting Their Pocket Spy Smartphone Illustration: Virtual Location, Felix Baynham Introduction Here at The Duke of Cyber, we’re big fans of … Read More

How To Get Into Cybersecurity
How To Get Into Cybersecurity I get this question often from students, peers, and professionals who want to make a career change. Instead of sending a Google Doc which only a few people will see, I decided to make this … Read More
MITRE Attack Design & Philosophy Essay
MITRE Attack Design & Philosophy Illustration: Pexel, Anete Lucina ATT&CK Framework Abstract: By reading the popular white paper called “MITRE Attack Design & Philosophy” one can be armed with the knowledge that this framework was created out of sheer necessity … Read More
How To Build a Cybersecurity Program
Creating a Cybersecurity Program So you have been voluntold to improve security at your company? Building a Cybersecurity Program is no easy task and requires a heart of lion to get started. Let’s get answers to several questions to build … Read More