SlideShare a Scribd company logo
Hackers Are People Too
http://bit.ly/SvWVb0
Part I: Intro
Amanda Berlin
@InfoSystir
Stuff I do
My idea, inspiration, and why I’m
here
Evil hackers at Derbycon
Around the world in 80 cons
Jayson Street at BsidesCMH
(Columbus, Ohio) 2014
drwhom and support from
friends/community
Part II: The Prep
Getting it started
Article written
Article made pretty
• http://imgur.com/gallery/n81cq
Freak Out
Get the article out there
It was harder than I thought
Talk to people
• Talk to friends not in IT
• ….wait, not sure I have any
FEEDBACK!
Positive Feedback
“Amanda, our community is honored to have you in it.
Being part of the InfoSec community means sharing and
improving each other and those we care about, work with,
and work for.” @WolfFlight
“Interesting perspective..keep blogging!”
“insert more positive feedback here”
Negative Feedback
“This post was put together by a script kiddie.”
“As a former hacker, I read the first image, thought it was
retarded, didn't look at anything else, and downvoted.”
Questions & Stuff
“…Question: how does the average computer user know
which security software to use so they Don’t get hacked?”
“What are the different kinds of hats?”
“How do I know if software comes with spyware?”
“I thought all hackers were bad…”
“You mean people get paid to do that?!?!”
The Hacker
 All the hats
The White Hat
• “A white hat hacker breaks security for
non-malicious reasons”
• CEH, CISSP, OSCP, OSCE, CPTE, etc
• Blue, Red, Purple
The Black Hat
• A "black hat" hacker is a hacker who
"violates computer security for little reason
beyond maliciousness or for personal
gain“
• A.K.A
The Grey Hat
• “A grey hat hacker may surf the internet
and hack into a computer system for the
sole purpose of notifying the administrator
that their system has a security defect”
Part III: What’s Out There
The Good
• DerbyCon 2011 raised over $13,000 for
the Hackers for Charity foundation, over
double that of other conferences. In both
2012 and 2013 they raised over $30,000!!
• BloodKode at Defcon continues to grow
and take blood donations.
• EFF
The Good cont.
• Anonymous catches pedophiles/cartels
• Takes down terrorist and hate group sites
The Good cont.
• Mubix runs #ProjectMentor for free infosec
hands on learning
• http://www.projectmentor.net/
The Good cont.
• Someone is sending me to training
• THANK YOU
• THANK YOU
• THANK YOU
• Support/guidance from the community
The Good cont.
Thought Leaders
The Good cont.
Substance Abuse Help
http://www.room362.com/blog/2014/05/26/go-home-
infosec-youre-drunk/
“ShmooCon runs an AA meeting at the con”
http://nathanheafner.com/home/2014/05/29/infosec-i-
didnt-fly-accross-the-sea-to-see-you-mumble-and-
stumble-on-stage/
http://theocddiaries.com/well-being/drinking-at-security-
cons/
The Good cont.
The Bad
The Ugly
Part IV: What you can do
A.K.A. The 10 step program
Step 1: Proactive Media
Organizing a con?
“A conference is just an admission that you
want somebody to join you in your troubles.”
- Will Rogers
Step 2: Don’t Be a Dbag
At a con or online
.
.
.
.
‘nuff said
Step 3: The big time
Local papers & TV
National news. Just mention it!
Step 4: Teh Webz
Social Media - Twitter, FB, imgur, reddit,
youtube, etc...
Step 5: Preach the word!
• Start talking about
– What we do
– What we protect
– Cool stuff in the community
Step 6: Get them involved
Start differentiating white/black hats
Secure their own data
Get other organizations to look into
security (http://solidmonster.com/)
Step 7: Distribute the information
• Canned responses
• Password guides
• Common sense security
Step 7: Do it for the children!!!
• @Hak4kidz
Step 8: Show your passion
• Break out of your shell, hard to do but
worth it
• Eve Adams (@HackerHuntress): Attack
Paths: Breaking Into Infosec From IT Or
Other Totally Different Fields
• Cue awkwardness (@rattis & @secureholio)
Step 9: Surprise!!
Random acts of infosec
Step 10: Man up
Don’t be an ass to normal users
“Your customer doesn’t care how much you
know until they know how much you care. ~
Damon Richards”
Sum it up
1. Include local media
2. No douchbags allowed
3. Mention it everywhere
4. Teh Webz
5. Social Media
6. Involve & Teach users
7. Canned responses
8. Talk to people irl
9. Pay it forward
10. Be nice to your users/customers
Part V: Closing
YAY!
• If you enjoyed my first talk buy me a drink
(after talks of course)
BOO!
• If you didn’t you still can buy me a drink
Contact info
• @infosystir
• Infosystir.blogspot.com
Questions?
• Click to add text

More Related Content

PPTX
#LTEC4121: Presentation of Self Online
PPTX
Cyber Security Awareness October 2014
PPTX
Digital Citizenship Initiative1
PPTX
Digital Self
PDF
2012 students-good internet choices
PDF
Your digital identity
PPSX
Antonin i-pribetic-ppt-using-social-media-tools-in-a-practical-and-ethical-way
PPTX
Developing Your Digital Identity
#LTEC4121: Presentation of Self Online
Cyber Security Awareness October 2014
Digital Citizenship Initiative1
Digital Self
2012 students-good internet choices
Your digital identity
Antonin i-pribetic-ppt-using-social-media-tools-in-a-practical-and-ethical-way
Developing Your Digital Identity

What's hot (20)

PPT
Social Media for Baby Boomers
PDF
11ntcfailinform resources
PPT
Managing information Overload
PPTX
Facebook
PPTX
Facebook
PPTX
[R]evolution: Elementary Workshop
PPTX
Slideshare online identity construction
PPT
New Media Institute Presentation
PPT
Digital identity16may13shorter
PDF
Social Justice. Social Good. Social Media. Social Change.
PPTX
Public by Default: Life Online in 2012
PPT
UX Week Presentation from Steve Portigal - Cross-Cultural Research
PDF
Social Media Overview-Bellagio Center Oct. 2011_v_final
PPT
Cyber awareness highschoolers
PPTX
Digital Footprints and Students Presentation
PPTX
Digital footprint
PPTX
Social Media: Do You? (BU Business Mania Event)
PPTX
Software networks
PPT
Why your digital reputation matters?
PPTX
Social media for sceptics
Social Media for Baby Boomers
11ntcfailinform resources
Managing information Overload
Facebook
Facebook
[R]evolution: Elementary Workshop
Slideshare online identity construction
New Media Institute Presentation
Digital identity16may13shorter
Social Justice. Social Good. Social Media. Social Change.
Public by Default: Life Online in 2012
UX Week Presentation from Steve Portigal - Cross-Cultural Research
Social Media Overview-Bellagio Center Oct. 2011_v_final
Cyber awareness highschoolers
Digital Footprints and Students Presentation
Digital footprint
Social Media: Do You? (BU Business Mania Event)
Software networks
Why your digital reputation matters?
Social media for sceptics

Similar to Hackers are people too (20)

PPT
All about Hacking
PPT
001.itsecurity bcp v1
PPTX
Hacking
PPTX
Ethical hacking 2016
PPTX
Ethical hacking
PPTX
Ethical hacking
PPTX
Hacking (cs192 report )
PPTX
Ethicalhacking
PDF
Ethicalhacking 130906120356-
PPTX
Ethical hacking presentation
PPTX
PPTX
Understanding Hackers: Types, Techniques, and Prevention Strategies.pptx
PPTX
I hack you hack we all hack
PPTX
Dhams hacking
PPTX
hacking basics
PPTX
August 2017 - Anatomy of a Cyber Attacker
PPTX
Offensive Security basics part 1
PPT
Computer hacking
PPTX
Ethical hacking
PPT
Introduction to hackers
All about Hacking
001.itsecurity bcp v1
Hacking
Ethical hacking 2016
Ethical hacking
Ethical hacking
Hacking (cs192 report )
Ethicalhacking
Ethicalhacking 130906120356-
Ethical hacking presentation
Understanding Hackers: Types, Techniques, and Prevention Strategies.pptx
I hack you hack we all hack
Dhams hacking
hacking basics
August 2017 - Anatomy of a Cyber Attacker
Offensive Security basics part 1
Computer hacking
Ethical hacking
Introduction to hackers

More from Amanda Berlin (6)

PPTX
Mental Health in Infosec: Hackers, Hugs, & Drugs
PPTX
InheritedASecurityDept
PPTX
Where to Start When Your Environment is Fucked
PPTX
Where To Start When Your Environment is Fucked
PPTX
Defcon 23 Comedy inception
PPTX
Shooting phish in a barrel
Mental Health in Infosec: Hackers, Hugs, & Drugs
InheritedASecurityDept
Where to Start When Your Environment is Fucked
Where To Start When Your Environment is Fucked
Defcon 23 Comedy inception
Shooting phish in a barrel

Recently uploaded (20)

PDF
KodekX | Application Modernization Development
PPTX
Cloud computing and distributed systems.
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Modernizing your data center with Dell and AMD
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Approach and Philosophy of On baking technology
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
KodekX | Application Modernization Development
Cloud computing and distributed systems.
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Network Security Unit 5.pdf for BCA BBA.
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Understanding_Digital_Forensics_Presentation.pptx
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Review of recent advances in non-invasive hemoglobin estimation
Modernizing your data center with Dell and AMD
Advanced methodologies resolving dimensionality complications for autism neur...
Approach and Philosophy of On baking technology
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Reach Out and Touch Someone: Haptics and Empathic Computing
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
CIFDAQ's Market Insight: SEC Turns Pro Crypto
“AI and Expert System Decision Support & Business Intelligence Systems”
20250228 LYD VKU AI Blended-Learning.pptx
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...

Hackers are people too

  • 1. Hackers Are People Too http://bit.ly/SvWVb0
  • 2. Part I: Intro Amanda Berlin @InfoSystir
  • 4. My idea, inspiration, and why I’m here Evil hackers at Derbycon Around the world in 80 cons Jayson Street at BsidesCMH (Columbus, Ohio) 2014 drwhom and support from friends/community
  • 8. Article made pretty • http://imgur.com/gallery/n81cq
  • 10. Get the article out there It was harder than I thought
  • 11. Talk to people • Talk to friends not in IT • ….wait, not sure I have any FEEDBACK!
  • 12. Positive Feedback “Amanda, our community is honored to have you in it. Being part of the InfoSec community means sharing and improving each other and those we care about, work with, and work for.” @WolfFlight “Interesting perspective..keep blogging!” “insert more positive feedback here”
  • 13. Negative Feedback “This post was put together by a script kiddie.” “As a former hacker, I read the first image, thought it was retarded, didn't look at anything else, and downvoted.”
  • 14. Questions & Stuff “…Question: how does the average computer user know which security software to use so they Don’t get hacked?” “What are the different kinds of hats?” “How do I know if software comes with spyware?” “I thought all hackers were bad…” “You mean people get paid to do that?!?!”
  • 15. The Hacker  All the hats
  • 16. The White Hat • “A white hat hacker breaks security for non-malicious reasons” • CEH, CISSP, OSCP, OSCE, CPTE, etc • Blue, Red, Purple
  • 17. The Black Hat • A "black hat" hacker is a hacker who "violates computer security for little reason beyond maliciousness or for personal gain“ • A.K.A
  • 18. The Grey Hat • “A grey hat hacker may surf the internet and hack into a computer system for the sole purpose of notifying the administrator that their system has a security defect”
  • 19. Part III: What’s Out There
  • 20. The Good • DerbyCon 2011 raised over $13,000 for the Hackers for Charity foundation, over double that of other conferences. In both 2012 and 2013 they raised over $30,000!! • BloodKode at Defcon continues to grow and take blood donations. • EFF
  • 21. The Good cont. • Anonymous catches pedophiles/cartels • Takes down terrorist and hate group sites
  • 22. The Good cont. • Mubix runs #ProjectMentor for free infosec hands on learning • http://www.projectmentor.net/
  • 23. The Good cont. • Someone is sending me to training • THANK YOU • THANK YOU • THANK YOU • Support/guidance from the community
  • 25. The Good cont. Substance Abuse Help http://www.room362.com/blog/2014/05/26/go-home- infosec-youre-drunk/ “ShmooCon runs an AA meeting at the con” http://nathanheafner.com/home/2014/05/29/infosec-i- didnt-fly-accross-the-sea-to-see-you-mumble-and- stumble-on-stage/ http://theocddiaries.com/well-being/drinking-at-security- cons/
  • 29. Part IV: What you can do A.K.A. The 10 step program
  • 30. Step 1: Proactive Media Organizing a con? “A conference is just an admission that you want somebody to join you in your troubles.” - Will Rogers
  • 31. Step 2: Don’t Be a Dbag At a con or online . . . . ‘nuff said
  • 32. Step 3: The big time Local papers & TV National news. Just mention it!
  • 33. Step 4: Teh Webz Social Media - Twitter, FB, imgur, reddit, youtube, etc...
  • 34. Step 5: Preach the word! • Start talking about – What we do – What we protect – Cool stuff in the community
  • 35. Step 6: Get them involved Start differentiating white/black hats Secure their own data Get other organizations to look into security (http://solidmonster.com/)
  • 36. Step 7: Distribute the information • Canned responses • Password guides • Common sense security
  • 37. Step 7: Do it for the children!!! • @Hak4kidz
  • 38. Step 8: Show your passion • Break out of your shell, hard to do but worth it • Eve Adams (@HackerHuntress): Attack Paths: Breaking Into Infosec From IT Or Other Totally Different Fields • Cue awkwardness (@rattis & @secureholio)
  • 39. Step 9: Surprise!! Random acts of infosec
  • 40. Step 10: Man up Don’t be an ass to normal users “Your customer doesn’t care how much you know until they know how much you care. ~ Damon Richards”
  • 41. Sum it up 1. Include local media 2. No douchbags allowed 3. Mention it everywhere 4. Teh Webz 5. Social Media 6. Involve & Teach users 7. Canned responses 8. Talk to people irl 9. Pay it forward 10. Be nice to your users/customers
  • 43. YAY! • If you enjoyed my first talk buy me a drink (after talks of course)
  • 44. BOO! • If you didn’t you still can buy me a drink
  • 45. Contact info • @infosystir • Infosystir.blogspot.com