SlideShare uma empresa Scribd logo
1 de 14
Baixar para ler offline
cheating the 10,000-hour rule
(become an expert in information security)
“there is a logic
 behind why
 some people
 become
 successful”
expert performance and deliberate practice
                       k. anders ericsson




   http://www.psy.fsu.edu/faculty/ericsson/ericsson.exp.perf.html
definition of expert
one who has acquired special skill in or knowledge of a particular
subjects through professional training and practical experience
how to spot an expert
experts exhibit their superior performance in public their
behaviour looks so effortless and natural that we are tempted to
attribute it to special talents. 
what makes experts tick?
1. measures of general basic capacities do not predict success
   in a domain
2. the superior performance of experts is often very domain
   specific and transfer outside their narrow area of expertise is
   surprisingly limited
3. systematic differences between experts and less proficient
   individuals nearly always reflect attributes acquired by the
   experts during their lengthy training
experts are made, not born
pro fessional hackers
jim geovedi                                   nal script kiddy
informatio n security troublemaker, professio




http://www.slideshare.net/geovedi/professional-hackers
critical mindset
1   be hungry

2   be in the right circle

3   be a teacher
1   be hungry

2   be in the right circle

3   be a teacher
1   be hungry

2   be in the right circle

3   be a teacher
@geovedi



http://slideshare.net/geovedi • http://linkedin.com/in/geovedi

Mais conteúdo relacionado

Destaque

Is Cyber-offence the New Cyber-defence?
Is Cyber-offence the New Cyber-defence?Is Cyber-offence the New Cyber-defence?
Is Cyber-offence the New Cyber-defence?Jim Geovedi
 
Satellite Hacking — Intro by Indianz (2012)
Satellite Hacking — Intro by Indianz (2012)Satellite Hacking — Intro by Indianz (2012)
Satellite Hacking — Intro by Indianz (2012)Jim Geovedi
 
Professional Hackers
Professional HackersProfessional Hackers
Professional HackersJim Geovedi
 
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship
Hacking a Bird in the Sky: Exploiting Satellite Trust RelationshipHacking a Bird in the Sky: Exploiting Satellite Trust Relationship
Hacking a Bird in the Sky: Exploiting Satellite Trust RelationshipJim Geovedi
 
The 21st Century Bank Job
The 21st Century Bank JobThe 21st Century Bank Job
The 21st Century Bank JobJim Geovedi
 
IDS & Log Management
IDS & Log ManagementIDS & Log Management
IDS & Log ManagementJim Geovedi
 
AI & NLP pada @begobet
AI & NLP pada @begobetAI & NLP pada @begobet
AI & NLP pada @begobetJim Geovedi
 
Wireless Hotspot: The Hackers Playground
Wireless Hotspot: The Hackers PlaygroundWireless Hotspot: The Hackers Playground
Wireless Hotspot: The Hackers PlaygroundJim Geovedi
 
Hacking Satellite: A New Universe to Discover
Hacking Satellite: A New Universe to DiscoverHacking Satellite: A New Universe to Discover
Hacking Satellite: A New Universe to DiscoverJim Geovedi
 
Waluku: Answering Astronomy Questions through Social Media
Waluku: Answering Astronomy Questions through Social MediaWaluku: Answering Astronomy Questions through Social Media
Waluku: Answering Astronomy Questions through Social MediaJim Geovedi
 
Cloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud ComputingCloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud ComputingJim Geovedi
 
HITB Labs: Practical Attacks Against 3G/4G Telecommunication Networks
HITB Labs: Practical Attacks Against 3G/4G Telecommunication NetworksHITB Labs: Practical Attacks Against 3G/4G Telecommunication Networks
HITB Labs: Practical Attacks Against 3G/4G Telecommunication NetworksJim Geovedi
 

Destaque (14)

Is Cyber-offence the New Cyber-defence?
Is Cyber-offence the New Cyber-defence?Is Cyber-offence the New Cyber-defence?
Is Cyber-offence the New Cyber-defence?
 
Satellite Hacking — Intro by Indianz (2012)
Satellite Hacking — Intro by Indianz (2012)Satellite Hacking — Intro by Indianz (2012)
Satellite Hacking — Intro by Indianz (2012)
 
Professional Hackers
Professional HackersProfessional Hackers
Professional Hackers
 
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship
Hacking a Bird in the Sky: Exploiting Satellite Trust RelationshipHacking a Bird in the Sky: Exploiting Satellite Trust Relationship
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship
 
The 21st Century Bank Job
The 21st Century Bank JobThe 21st Century Bank Job
The 21st Century Bank Job
 
IDS & Log Management
IDS & Log ManagementIDS & Log Management
IDS & Log Management
 
AI & NLP pada @begobet
AI & NLP pada @begobetAI & NLP pada @begobet
AI & NLP pada @begobet
 
Hacking Trust
Hacking TrustHacking Trust
Hacking Trust
 
Wireless Hotspot: The Hackers Playground
Wireless Hotspot: The Hackers PlaygroundWireless Hotspot: The Hackers Playground
Wireless Hotspot: The Hackers Playground
 
Internet Worms
Internet WormsInternet Worms
Internet Worms
 
Hacking Satellite: A New Universe to Discover
Hacking Satellite: A New Universe to DiscoverHacking Satellite: A New Universe to Discover
Hacking Satellite: A New Universe to Discover
 
Waluku: Answering Astronomy Questions through Social Media
Waluku: Answering Astronomy Questions through Social MediaWaluku: Answering Astronomy Questions through Social Media
Waluku: Answering Astronomy Questions through Social Media
 
Cloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud ComputingCloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud Computing
 
HITB Labs: Practical Attacks Against 3G/4G Telecommunication Networks
HITB Labs: Practical Attacks Against 3G/4G Telecommunication NetworksHITB Labs: Practical Attacks Against 3G/4G Telecommunication Networks
HITB Labs: Practical Attacks Against 3G/4G Telecommunication Networks
 

Semelhante a Cheating the 10,000 hour rule

Advanced Certificate in Security Management
Advanced Certificate in Security ManagementAdvanced Certificate in Security Management
Advanced Certificate in Security Management360 BSI
 
Information Security Management Education Program - Concept Document
Information Security Management Education Program - Concept Document Information Security Management Education Program - Concept Document
Information Security Management Education Program - Concept Document Dinesh O Bareja
 
Integrated Work Experience Strategy
Integrated Work Experience Strategy Integrated Work Experience Strategy
Integrated Work Experience Strategy Vijayananda Mohire
 
3. How-to-define-a-Competency-Competency-statements-that-work.pdf
3. How-to-define-a-Competency-Competency-statements-that-work.pdf3. How-to-define-a-Competency-Competency-statements-that-work.pdf
3. How-to-define-a-Competency-Competency-statements-that-work.pdfnguyenanvuong2007
 
Mapping Your Career in Physical Security
Mapping Your Career in Physical SecurityMapping Your Career in Physical Security
Mapping Your Career in Physical Securityguidepostsolutions
 
Talent and development
Talent and developmentTalent and development
Talent and developmentPekka Suominen
 
Presentation on "Knowledge acquisition & validation"
  Presentation on "Knowledge acquisition & validation"  Presentation on "Knowledge acquisition & validation"
Presentation on "Knowledge acquisition & validation"Aditya Sarkar
 
Knowledge management
Knowledge managementKnowledge management
Knowledge managementLibra chudry
 
WORKSHOP: Performance Effectiveness, by Rahila Narejo
WORKSHOP: Performance Effectiveness, by Rahila NarejoWORKSHOP: Performance Effectiveness, by Rahila Narejo
WORKSHOP: Performance Effectiveness, by Rahila Narejo♚ MBT- Khalid ♞
 
Knowledge Risk & Retention Kmlf Presentation 24 February 2010 Dr Kate Andrews
Knowledge Risk & Retention   Kmlf Presentation 24 February 2010 Dr Kate AndrewsKnowledge Risk & Retention   Kmlf Presentation 24 February 2010 Dr Kate Andrews
Knowledge Risk & Retention Kmlf Presentation 24 February 2010 Dr Kate Andrewsknowable
 
Why Smart Employees Underperform
Why Smart Employees UnderperformWhy Smart Employees Underperform
Why Smart Employees Underperformmother55
 
Storytelling for research software engineers
Storytelling for research software engineersStorytelling for research software engineers
Storytelling for research software engineersAlbanLevy
 
Defend the Digital Frontier: The Pinnacle of CEH Training in Jaipur
Defend the Digital Frontier: The Pinnacle of CEH Training in JaipurDefend the Digital Frontier: The Pinnacle of CEH Training in Jaipur
Defend the Digital Frontier: The Pinnacle of CEH Training in Jaipurccasociety1
 
Market Research
Market ResearchMarket Research
Market Researchtrilogy
 
Linkedin Seminar, Training, Workshop for Mortgage Professionals MGIC Septembe...
Linkedin Seminar, Training, Workshop for Mortgage Professionals MGIC Septembe...Linkedin Seminar, Training, Workshop for Mortgage Professionals MGIC Septembe...
Linkedin Seminar, Training, Workshop for Mortgage Professionals MGIC Septembe...Mindfull
 
The expert as leader - stories from our latest research - webinar
The expert as leader - stories from our latest research - webinarThe expert as leader - stories from our latest research - webinar
The expert as leader - stories from our latest research - webinarRoffey Park
 
Nexus It Group Resume Writing
Nexus It Group   Resume WritingNexus It Group   Resume Writing
Nexus It Group Resume Writingtlinde
 

Semelhante a Cheating the 10,000 hour rule (20)

Advanced Certificate in Security Management
Advanced Certificate in Security ManagementAdvanced Certificate in Security Management
Advanced Certificate in Security Management
 
Information Security Management Education Program - Concept Document
Information Security Management Education Program - Concept Document Information Security Management Education Program - Concept Document
Information Security Management Education Program - Concept Document
 
Integrated Work Experience Strategy
Integrated Work Experience Strategy Integrated Work Experience Strategy
Integrated Work Experience Strategy
 
3. How-to-define-a-Competency-Competency-statements-that-work.pdf
3. How-to-define-a-Competency-Competency-statements-that-work.pdf3. How-to-define-a-Competency-Competency-statements-that-work.pdf
3. How-to-define-a-Competency-Competency-statements-that-work.pdf
 
Mapping Your Career in Physical Security
Mapping Your Career in Physical SecurityMapping Your Career in Physical Security
Mapping Your Career in Physical Security
 
Talent and development
Talent and developmentTalent and development
Talent and development
 
Presentation on "Knowledge acquisition & validation"
  Presentation on "Knowledge acquisition & validation"  Presentation on "Knowledge acquisition & validation"
Presentation on "Knowledge acquisition & validation"
 
Knowledge management
Knowledge managementKnowledge management
Knowledge management
 
WORKSHOP: Performance Effectiveness, by Rahila Narejo
WORKSHOP: Performance Effectiveness, by Rahila NarejoWORKSHOP: Performance Effectiveness, by Rahila Narejo
WORKSHOP: Performance Effectiveness, by Rahila Narejo
 
Knowledge Risk & Retention Kmlf Presentation 24 February 2010 Dr Kate Andrews
Knowledge Risk & Retention   Kmlf Presentation 24 February 2010 Dr Kate AndrewsKnowledge Risk & Retention   Kmlf Presentation 24 February 2010 Dr Kate Andrews
Knowledge Risk & Retention Kmlf Presentation 24 February 2010 Dr Kate Andrews
 
Professionalism
ProfessionalismProfessionalism
Professionalism
 
Why Smart Employees Underperform
Why Smart Employees UnderperformWhy Smart Employees Underperform
Why Smart Employees Underperform
 
Storytelling for research software engineers
Storytelling for research software engineersStorytelling for research software engineers
Storytelling for research software engineers
 
EBMgt Course Module 3: Why Do We Need It?
EBMgt Course Module 3: Why Do We Need It?EBMgt Course Module 3: Why Do We Need It?
EBMgt Course Module 3: Why Do We Need It?
 
Defend the Digital Frontier: The Pinnacle of CEH Training in Jaipur
Defend the Digital Frontier: The Pinnacle of CEH Training in JaipurDefend the Digital Frontier: The Pinnacle of CEH Training in Jaipur
Defend the Digital Frontier: The Pinnacle of CEH Training in Jaipur
 
Market Research
Market ResearchMarket Research
Market Research
 
Linkedin Seminar, Training, Workshop for Mortgage Professionals MGIC Septembe...
Linkedin Seminar, Training, Workshop for Mortgage Professionals MGIC Septembe...Linkedin Seminar, Training, Workshop for Mortgage Professionals MGIC Septembe...
Linkedin Seminar, Training, Workshop for Mortgage Professionals MGIC Septembe...
 
Linkedin Training for Lending Professionals
Linkedin Training for Lending ProfessionalsLinkedin Training for Lending Professionals
Linkedin Training for Lending Professionals
 
The expert as leader - stories from our latest research - webinar
The expert as leader - stories from our latest research - webinarThe expert as leader - stories from our latest research - webinar
The expert as leader - stories from our latest research - webinar
 
Nexus It Group Resume Writing
Nexus It Group   Resume WritingNexus It Group   Resume Writing
Nexus It Group Resume Writing
 

Último

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 

Último (20)

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 

Cheating the 10,000 hour rule

  • 1. cheating the 10,000-hour rule (become an expert in information security)
  • 2. “there is a logic behind why some people become successful”
  • 3. expert performance and deliberate practice k. anders ericsson http://www.psy.fsu.edu/faculty/ericsson/ericsson.exp.perf.html
  • 4. definition of expert one who has acquired special skill in or knowledge of a particular subjects through professional training and practical experience
  • 5. how to spot an expert experts exhibit their superior performance in public their behaviour looks so effortless and natural that we are tempted to attribute it to special talents. 
  • 6. what makes experts tick? 1. measures of general basic capacities do not predict success in a domain 2. the superior performance of experts is often very domain specific and transfer outside their narrow area of expertise is surprisingly limited 3. systematic differences between experts and less proficient individuals nearly always reflect attributes acquired by the experts during their lengthy training
  • 7. experts are made, not born
  • 8.
  • 9. pro fessional hackers jim geovedi nal script kiddy informatio n security troublemaker, professio http://www.slideshare.net/geovedi/professional-hackers
  • 11. 1 be hungry 2 be in the right circle 3 be a teacher
  • 12. 1 be hungry 2 be in the right circle 3 be a teacher
  • 13. 1 be hungry 2 be in the right circle 3 be a teacher