Continuous%20Security%20Validation%20Unveiling%20the%20Secrets%3B%20The%20Intersection%20of%20Magic%20and%20Cybersecurity.png?profile=RESIZE_710x

 

Join us as cybersecurity expert Brad shares insights drawn from his passion for both cybersecurity and magic. Discover the striking similarities between performing magic tricks and defending against cyber threats.

.

 

Here is the verbatim discussion:

and ultimately like I love hearing people laugh and just overall just enjoying life and um so over the years I've have certainly done that and a lot a lot of it is like you know it's very similar to what I do today in cyber security so you know when you're in you're actually um putting on a magic show or you're doing that you know first off you don't you don't really know what you're doing when you start and you know it starts by making that decision have that mindset I'm going to be a magician or I'm going to just do a magic trick um and and be really good at that one thing and then move to the second thing and then it's that whole crawl walk and run thing uh and approach and um within uh earlier you mentioned about magic magic is also I'm I'm quite passionate about it I I used to do shows at one point in time now I don't uh I had been kind of out of touch but I'm still curious so one interesting thing about magic is if you could place a lot of eyes from all possible directions around the magician and if you could continuously keep an eye then the magician can't fool you if you can look at the magician from 360 Dees but and um look at all the places simultaneously and I think you know we we are facing a similar challenge right our problem is just like in the case of magic we have only one pair of eyes so we focus on one thing mag.

 

Highlights:

Starting with a Decision: Brad draws parallels between starting a career in magic and embarking on a cybersecurity journey. Just as magicians begin with a decision to master their craft, cybersecurity professionals commit to continuous learning and improvement.

Crawl, Walk, Run Approach: Brad emphasizes the importance of adopting a crawl, walk, run approach in both magic and cybersecurity. Mastering one skill at a time and gradually progressing leads to proficiency and success.

Continuous Vigilance: The discussion delves into the concept of continuous visibility, drawing parallels to magic performances. Brad highlights how having multiple pairs of eyes observing a magician from all angles prevents deception. Similarly, continuous monitoring and awareness in cybersecurity can thwart attacks.

Facing Limitations: Brad acknowledges the challenge of focusing on multiple aspects simultaneously, likening it to the limitations of human perception in magic tricks. In cybersecurity, professionals must prioritize and allocate resources effectively to address vulnerabilities.

 

Brad underscores the importance of applying lessons from magic to cybersecurity, emphasizing continuous learning, strategic planning, and vigilance. By understanding the parallels between these seemingly disparate domains, cybersecurity professionals can enhance their defense strategies and stay ahead of evolving threats.

 

Speakers:

Brad LaPorte a former army officer with extensive experience in cybersecurity, provides invaluable insights into the evolving landscape of digital threats. With a background in military operations, LaPorte witnessed firsthand the early stages of nation-state cyber attacks, laying the groundwork for his deep understanding of cybersecurity challenges. Through his journey, he has observed the transformation of defense tactics from traditional, labor-intensive methods to modern, cloud-based solutions. LaPorte's expertise offers a unique perspective on the intersection of technology, security, and the underground economy of cybercrime. In this discussion, he shares his experiences and analysis, shedding light on the complexities of cybersecurity in the digital age.

 
 
 
 

Bikash Barai is credited for several innovations in the domain of Network Security and Anti-Spam Technologies and has multiple patents in USPTO. Fortune recognized Bikash among India’s Top 40 Business Leaders under the age of 40 (Fortune 40-under-40).Bikash is also an active speaker and has spoken at various forums like TiE, RSA Conference USA, TEDx etc.

Earlier he founded iViZ an IDG Ventures-backed company that was later acquired by Cigital and now Synopsys. iViZ was the first company in the world to take Ethical Hacking (or Penetration Testing) to the cloud.

 

https://twitter.com/bikashbarai1

https://www.linkedin.com/in/bikashbarai/ 

 

 
 
 
 
 
 
E-mail me when people leave their comments –

You need to be a member of CISO Platform to add comments!

Join CISO Platform